Network Security Using Flow Based Intrusion Detection System

Jeya S*, Ramar K**
*Associate Professor KS.R. College of Engineering, Thiruchengode, Namakkai,TamiiNadu, India
**Prof. & HOD/CSE Department,National Engineering College,Kovilpatti TamiiNadu, India.
Periodicity:October - December'2007
DOI : https://doi.org/10.26634/jse.2.2.536

Abstract

Flow based intrusion detection system is one of the network security system. In addition, guidelines to properly configure and setup network device to minimize the possibilities that network attacks come from inside are also proposed. As the Internet becomes the platform of daily activities, the threat of network attack is also become more serious. Firewall along is not able to protect the system from being attacked through normal service channel. Furthermore, most of the current intrusion detection system focuses on the border of organization network. If the attack comes from inside, this setup does not provide protection to hosts in the local network and the network itself: Therefore, we need to use other mechanism to protect the critical system as well as the network itself: We propose an inexpensive and easy to implement way to perform the anomaly type intrusion detection based on the Net Flow data exported from the routers or other network probes. Our system can detect several types of network attack from inside or outside and perform counter maneuver accordingly.

Keywords

Intrusion Detection System, Network Security, Net Flow, Network Probe

How to Cite this Article?

Jeya S and Ramar K (2007). Network Security Using Flow Based Intrusion Detection System.i-manager’s Journal on Software Engineering, 2(2), 6-13. https://doi.org/10.26634/jse.2.2.536

References

[ I ]. Choker Kotor, "Combining Multiple Techniques for Intrusion Detection", international Journal of Computer Science and Network Security, VOL,6 No.2B, February 2006.
[2]. Dong Seong Kin, Ho Nam Ngugen, Jong Sou Pork, "Genetic Algorithm to improve SVM based Network Intrusion Detection System", Advanced information Networking and Application, Vol 2, Pg 155-158, March 28- 30, 2005 . .
[3]. Geer D., "Behavior based Network Security goes molnstreom", IEEE Computer Society, Vol 39, issue 3, Pg 14-17, March 2006
[4]. Huoizhi Li, Mukesh Singhoi, "Trust Management in Distributed System" , IEEE Computer Society, Vol 40, issue 2, Pg 45-53, Feb 2007.
[5]. Huntley C. L, "A developmental view of System security", IEEE Computer Society Vol 39, issue 1, Pg 113- 114, Jan 2006.
[6]. Jungck R Shim ssy, "Issues in high speed Internet security" , IEEE Computer Society, Vol 37, Issue 7, Pg 36- 42, July 2004. .
[7]. Kemmerer R A, Vigno G , "Hi ORA: Intrusion Detection for Internet Security", Proceedings of the IEEE, Vol 93, Issue 10, Pg 1848-1857, Oct 2005
[8]. Kemmerer R A, Vigno G , "Intrusion detection : O brief history and overview", IEEE Computer Society, Vol 35, Issue 4, Pg 27-30, April 2002. ,
[9].tackle T, Yosinsoc A, "Metodoto for Anomaly based Security Protocol attack Detection", IEEE Transaction on Knowledge and Data Engineering, Vol 16, issue 9, Pg 1157-11 68, Sept 2004
[ I 0]. Mishro A, Nodkomi K, Potcho A, "intrusion Detection In wireless ad-hoc Network", IEEE Wireless Communications, Vol 4, issue 1, Pg 48-60, Feb 2004.
[ I I ]. Nong Ye, Farley T, "A Scientific approach to cyber attack detectlon", IEEE Computer Society, Vol 38, issue 11, Pg 55-61, Nov 2005
[ I 2]. Song Long Pao T, Po Wei Wong, "Net flow based Intrusion Detection System", IEEE International Conference on Networking sensing & Control, Vol-2, Pg 731-736, 2004.
[13]. Song Jun Hon, Sung Boo Cho, "Evolutionary neural network for anomaly detection based on the behaviour Of a program", IEEE Transaction on ystems, Man and Cybernetics, Part B, Vol 36, issue 3, Pg 559-570, June 2006.
[14]. Sorosommo S T, Zhu Q A, Huff J, "Hierarchical Kohonenen net for anomaly detection in Network Security", IEEE transaction on Man and Cybernetics, Vol 35, issue 2, Pg 302-3 I 2, April 2005.
[I 5]. Vijairogovon V, Shoh D, Goigoii R Shoh D, Srinivoson V, Bhotio L, "Marking Technique to isolate boundary router and attacker" , IEEE Computer Society, Vol 40, issue 2, Pg 54-58, Feb 2007.
[ I 6]. Ying Dor Lin, Chih Wei Jon, Po Ching Lin, Yuon Cheng Loi, "Designing an integrated Architecture for Network Content Security Gateways", IEEE Computer Society, Vol 39, issue I I , Pg 66-72, Nov 2006 .
[ I 7]. Yu F Loksmon T V, Motoyomo M A, Rote R H, "Efficient Multi match Packet classification for Network Security Application", IEEE Journal on Selected areas in Communications, Vol 24, Issue 10, Pg 1805-1816, Oct 2006.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.