Efficient Working of Signature Based Intrusion Detection Technique in Computer Networks

Authors

  • Dr. Abid Hussain  Assistant Professor, School of Computer Applications, Career Point University, Kota, Rajasthan, India
  • Dr. Praveen Kumar Sharma  Vardhman Mahaveer Open University, Kota, Rajasthan, India

DOI:

https://doi.org//10.32628/CSEIT195215

Keywords:

IDS, Signature, Security, IPS, Information Security, Attacks, Threats, Snort, Packet Decoder, Detection Engine.

Abstract

The subject of Computer Network Intrusion Detection System (IDS) is a very interesting research topic actively pursued by many investigators. The goal of intrusion detection is to monitor network assets and to detect anomalous behaviour and misuse. This concept has been around for the past several years but only recently, it has seen a dramatic rise in interest of researchers and system developers for incorporation into the overall information security infrastructure. In today's world, the concept of information has been moved to the digital size from conventional size. Protection of the data stored in the digital archive and is easily accessibility at any time have become a quite important phenomenon. In this concept, intrusion detection and prevention systems as security tools are widely used today [1]. In this paper, a signature based intrusion detection system approach has been proposed for computer network security. This paper is based on the efficient working of the Signature based intrusion detection method and protects the computer network against the intrusion or the unspecified packets.

References

  1. D. E. Denning. “An Intrusion-Detection Model”. IEEE transactions on software engineering, Volume : 13 Issue: 2, February 1987.
  2. J.P. Anderson, “Computer security technology planning study”. Technical Report, ESDTR-73-51, United States Air Force, Electronic Systems Division, October 1972..
  3. Axelsson, S (2000). "Intrusion Detection Systems: A Survey and Taxonomy" (retrieved 21 May 2018)
  4. Brandon Lokesak (December 4, 2008). "A Comparison Between Signature Based and Anomaly Based Intrusion Detection Systems"(PPT). www.iup.edu.
  5. DP Gaikwad, P Pabshettiwar, P Musale, P Paranjape, AS. Pawar, "A proposal for implementation of signature based intrusion detection system using multithreading technique", International Journal of Computational Engineering Research (ijceronline.com)., vol. 2, no. 7, 2012
  6. https://www.elprocus.com/basic-intrusion-detection-system/ “Advantage and Disvantages of Signature based Intrusion Detection System”
  7. Philip Chan,”Signature based Intrusion Detection System”, CS 598 MCC Spring 2013
  8. Hwang,K., Cai,M., Chen,Y and Qin,M. , “Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes”, IEEE Transactions on Dependable Computing, Volume: 4 Issue: 1, pp. 41- 55, 2007.
  9. Martin Roesch (2009), “Snort User Manual 2.8.5”, available: http://www.snort.org/assets/125/snort_manual2_8_5_1.pdf.
  10. Yang Li, Research and Implementation of intrusion detection system based on Snort[J], Beijing:The Technology and Application of Network Security, 11 2009.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Abid Hussain, Dr. Praveen Kumar Sharma, " Efficient Working of Signature Based Intrusion Detection Technique in Computer Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.60-64, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195215