Intelligence Intrusion Multi Detection Prevention System Principles

S. Murugan*, K.Kuppusamy**
* Research Scholar, Department of Computer Science and Engineering, Alagappa University, Karaikudi, India.
** Professor and Chairperson, Department of Computer Science and Engineering, Alagappa University, Karaikudi, Tamilnadu.
Periodicity:July - September'2015
DOI : https://doi.org/10.26634/jse.10.1.3630

Abstract

Research on intelligence Intrusion Detection Prevention Systems (IDPSs) found in the literature survey are effectively used to identify and detect only known Network attacks and are unable to evaluate the risk of Network service. In order to overcome limitations of the existing Intrusion Detection System (IDS), a new active defense system with Intelligence principles named IIDPS (Intelligence Intrusion Detecton Prevention System) for detecting and preventing unknown malware has been proposed in this article. This system fulfills the objectives of security like authenticity, confidentiality, integrity, availability, and non-repudiation.

Keywords

Intelligence Intrusion Detection Prevention System (IIDPS), Unknown Malware, Intelligence Intrusion Multi Detection Prevention Systems (IIMDPS).

How to Cite this Article?

Murugan, S., and Kuppusamy, K. (2015). Intelligence Intrusion Multi Detection Prevention Systems Principles. i-manager’s Journal on Software Engineering, 10(1), 31-41. https://doi.org/10.26634/jse.10.1.3630

References

[1]. Chebrolu S., Abraham A., and Thomas J.P., (2005). “Feature detection and ensemble design of intrusion detection systems”, Compute Security, Vol.24, pp.295–307.
[2]. Chen Y., Abraham A., and Yang J., (2005). “Feature deduction and intrusion detection using flexible neural trees”, Second IEEE International Symposium on Neural Networks.
[3]. Chen, Z., L. Gao, and K. Kwiat, (2003). “Modeling the Spread of Active Worms”, INFOCOM. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE.
[4]. Chou T-S, and Yen KK, “Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks”, The 2007 IEEE workshop on information assurance, United States Military Academy, West Point, NY, pp.207–213.
[5]. Ghosh A.K., Schwartzbard A., and Schatz M., (1999). “Learning program behavior profiles for intrusion detection”, Workshop on intrusion detection and network monitoring, Santa Clara, CA, USENIX.
[6]. Meystel, A.M. and Albus, J.M., (2002). “Intelligent Systems Architecture, Design, and Control”, New York, New York, John Wiley & Sons, Inc.
[7]. Mukkamala S, Sung A, Abraham, (2004). “Designing intrusion detection systems: architectures and perspectives”, The International Engineering Consortium (IEC) Annual Review of Communications, Vol.57, pp.1229–1241.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.