Efficient Working of Signature Based Intrusion Detection Technique in Computer Networks
DOI:
https://doi.org/10.32628/CSEIT195215Keywords:
IDS, Signature, Security, IPS, Information Security, Attacks, Threats, Snort, Packet Decoder, Detection Engine.Abstract
The subject of Computer Network Intrusion Detection System (IDS) is a very interesting research topic actively pursued by many investigators. The goal of intrusion detection is to monitor network assets and to detect anomalous behaviour and misuse. This concept has been around for the past several years but only recently, it has seen a dramatic rise in interest of researchers and system developers for incorporation into the overall information security infrastructure. In today's world, the concept of information has been moved to the digital size from conventional size. Protection of the data stored in the digital archive and is easily accessibility at any time have become a quite important phenomenon. In this concept, intrusion detection and prevention systems as security tools are widely used today [1]. In this paper, a signature based intrusion detection system approach has been proposed for computer network security. This paper is based on the efficient working of the Signature based intrusion detection method and protects the computer network against the intrusion or the unspecified packets.
References
- D. E. Denning. “An Intrusion-Detection Model”. IEEE transactions on software engineering, Volume : 13 Issue: 2, February 1987.
- J.P. Anderson, “Computer security technology planning study”. Technical Report, ESDTR-73-51, United States Air Force, Electronic Systems Division, October 1972..
- Axelsson, S (2000). "Intrusion Detection Systems: A Survey and Taxonomy" (retrieved 21 May 2018)
- Brandon Lokesak (December 4, 2008). "A Comparison Between Signature Based and Anomaly Based Intrusion Detection Systems"(PPT). www.iup.edu.
- DP Gaikwad, P Pabshettiwar, P Musale, P Paranjape, AS. Pawar, "A proposal for implementation of signature based intrusion detection system using multithreading technique", International Journal of Computational Engineering Research (ijceronline.com)., vol. 2, no. 7, 2012
- https://www.elprocus.com/basic-intrusion-detection-system/ “Advantage and Disvantages of Signature based Intrusion Detection System”
- Philip Chan,”Signature based Intrusion Detection System”, CS 598 MCC Spring 2013
- Hwang,K., Cai,M., Chen,Y and Qin,M. , “Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes”, IEEE Transactions on Dependable Computing, Volume: 4 Issue: 1, pp. 41- 55, 2007.
- Martin Roesch (2009), “Snort User Manual 2.8.5”, available: http://www.snort.org/assets/125/snort_manual2_8_5_1.pdf.
- Yang Li, Research and Implementation of intrusion detection system based on Snort[J], Beijing:The Technology and Application of Network Security, 11 2009.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.