Efficient Working of Signature Based Intrusion Detection Technique in Computer Networks

Authors(2) :-Dr. Abid Hussain, Dr. Praveen Kumar Sharma

The subject of Computer Network Intrusion Detection System (IDS) is a very interesting research topic actively pursued by many investigators. The goal of intrusion detection is to monitor network assets and to detect anomalous behaviour and misuse. This concept has been around for the past several years but only recently, it has seen a dramatic rise in interest of researchers and system developers for incorporation into the overall information security infrastructure. In today's world, the concept of information has been moved to the digital size from conventional size. Protection of the data stored in the digital archive and is easily accessibility at any time have become a quite important phenomenon. In this concept, intrusion detection and prevention systems as security tools are widely used today [1]. In this paper, a signature based intrusion detection system approach has been proposed for computer network security. This paper is based on the efficient working of the Signature based intrusion detection method and protects the computer network against the intrusion or the unspecified packets.

Authors and Affiliations

Dr. Abid Hussain
Assistant Professor, School of Computer Applications, Career Point University, Kota, Rajasthan, India
Dr. Praveen Kumar Sharma
Vardhman Mahaveer Open University, Kota, Rajasthan, India

IDS, Signature, Security, IPS, Information Security, Attacks, Threats, Snort, Packet Decoder, Detection Engine.

  1. D. E. Denning. “An Intrusion-Detection Model”. IEEE transactions on software engineering, Volume : 13 Issue: 2, February 1987.
  2. J.P. Anderson, “Computer security technology planning study”. Technical Report, ESDTR-73-51, United States Air Force, Electronic Systems Division, October 1972..
  3. Axelsson, S (2000). "Intrusion Detection Systems: A Survey and Taxonomy" (retrieved 21 May 2018)
  4. Brandon Lokesak (December 4, 2008). "A Comparison Between Signature Based and Anomaly Based Intrusion Detection Systems"(PPT). www.iup.edu.
  5. DP Gaikwad, P Pabshettiwar, P Musale, P Paranjape, AS. Pawar, "A proposal for implementation of signature based intrusion detection system using multithreading technique", International Journal of Computational Engineering Research (ijceronline.com)., vol. 2, no. 7, 2012
  6. https://www.elprocus.com/basic-intrusion-detection-system/ “Advantage and Disvantages of Signature based Intrusion Detection System”
  7. Philip Chan,”Signature based Intrusion Detection System”, CS 598 MCC Spring 2013
  8. Hwang,K., Cai,M., Chen,Y and Qin,M. , “Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes”, IEEE Transactions on Dependable Computing, Volume: 4 Issue: 1, pp. 41- 55, 2007.
  9. Martin Roesch (2009), “Snort User Manual 2.8.5”, available: http://www.snort.org/assets/125/snort_manual2_8_5_1.pdf.
  10. Yang Li, Research and Implementation of intrusion detection system based on Snort[J], Beijing:The Technology and Application of Network Security, 11 2009.

Publication Details

Published in : Volume 5 | Issue 2 | March-April 2019
Date of Publication : 2019-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 60-64
Manuscript Number : CSEIT195215
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. Abid Hussain, Dr. Praveen Kumar Sharma, "Efficient Working of Signature Based Intrusion Detection Technique in Computer Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.60-64, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT195215
Journal URL : http://ijsrcseit.com/CSEIT195215

Article Preview