Academic literature on the topic 'Instrusion Prevention System (IPS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Instrusion Prevention System (IPS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Instrusion Prevention System (IPS)"

1

Adi Wijaya, Adi Wijaya, Toibah Umi Kalsum, and Riska. "Penerapan OPNsense Sebagai Sistem Keamanan Web Server Menggunakan Metode Host Instrusion Prevention System." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 13, no. 2 (2023): 91–100. http://dx.doi.org/10.33369/jamplifier.v13i2.31514.

Full text
Abstract:
This research was conducted to detect and prevent disturbances or intrusions that occur on web servers, because by default the security system on web servers in a network still depends on the administrator, so the security of server really depends on the alertness of an administrator in responding to disturbances that occur on the web server. This research is using experimental method. This research was carried out by implementing OPNsense as a web server security system using Host Intrusion Prevention System method. The experimental results are then documented to carry out analysis so that appropriate recommendations are produced for designing a web server security system using HIPS method. The results of this research show that OPNsense can be used as a Host Intrusion Prevention System for LAN networks to secure web servers. OPNsense can prevent Port Scanning carried out on LAN networks. SQL injection process failed because no ID parameter was found. Apart from that, information is also visible that the web server is protected by WAF/IPS. Metasploit application via eth0 does not have permission to carry out a DOS attack on network devices with the address 192.168.80.200, which is the address of the web server.
APA, Harvard, Vancouver, ISO, and other styles
2

Nugroho, Dyakso Anindito, Adian Fatchur Rochim, and Eko Didik Widianto. "Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 171. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.171-178.

Full text
Abstract:
The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS) is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE) protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.
APA, Harvard, Vancouver, ISO, and other styles
3

Nugroho, Muhammad Arief, and Novian Anggis Suwastika. "Perancangan Intrusion Prevention System pada Jaringan Software Defined Networks." JUMANJI (Jurnal Masyarakat Informatika Unjani) 2, no. 1 (2018): 1. http://dx.doi.org/10.26874/jumanji.v2i1.17.

Full text
Abstract:
Keamanan jaringan telah menjadi bagian penting dalam implementasi di dalam jaringan Software Defined Network (SDN). Menyelenggarakan jaringan aman di dalam jaringan SDN merupakan tantangan tersendiri karena bagaimana sebuah perangkat jaringan dapat mampu mengenali, mengidentifikasi, dan mencegah serangan di level perangkat jaringan bukan di level host. Intrusion Prevention System (IPS) memberikan kemampuan untuk mengenali, mengidentifikasi, dan mencegah serangan yang terjadi secara otomatis. Integrasi IPS ke dalam jaringan SDN memberikan keuntungan bahwa administrator dapat mengatur dan memonitor keamanan jaringan secara terpusat. Dari hasil pengujian yang telah dilakukan, integrasi IPS ke dalam jaringan SDN mampu mendeteksi dan mencegah serangan yang terjadi dalam jaringan SDN sesuai dengan rule yang terdefinisi dalam IPS. Namun, terjadi penurunan kinerja throughput, delay, dan jitter di dalam jaringan SDN. Hal ini terjadi karena setiap paket yang melewati perangkat jaringan harus melewati proses pengecekan rule di dalam IPS.
APA, Harvard, Vancouver, ISO, and other styles
4

Surbakti, Kevin Jorenta, Rohmat Tulloh, and Muhammad Nazel Djibran. "Implementasi Anti-DDOS Menggunakan Intrusion Prevention System (IPS) terhadap Serangan DDOS." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 330–40. http://dx.doi.org/10.32493/informatika.v8i2.33685.

Full text
Abstract:
Distributed Denial of Service (DDoS) is a type of attack that can exhaust server resources. This attack results in a decrease in server quality so that it cannot be accessed by authorized users. Servers that are commonly victimized by this attack belong to companies from various sectors. PT Datacomm Diangraha provides solutions to these problems. As PT Datacomm Diangraha will do to Company X, which is to implement an Intrusion Prevention System (IPS) device as Anti-DDoS on its customers according to the customer's needs. This paper will test IPS devices in preventing DDoS attacks such as TCP Flood, UDP Flood, and ICMP Flood. The test is conducted by connecting the attacker and victim to the IPS device in the local network. The analysis will be done by comparing the network traffic and throughput of the victim when the attack is carried out when protected by IPS, no protection, and when traffic is normal. Experiments were conducted by performing a one-minute attack. The results of the experiments show that the traffic when protected by an IPS is similar to that during normal traffic. In addition, tests were conducted to prevent XSS malware to prove that IPS can prevent other attacks besides DDoS. From the test results, it was found that IPS can prevent DDoS attacks with 100% accuracy. The throughput data obtained when a DDoS attack occurs without IPS protection is 260978.9 - 1080732.32 bps. Throughput data when a DDoS attack occurs with IPS protection of 42.55 - 49.95 bps, which shows similarity in value with throughput during normal traffic which is 43.43 bps.
APA, Harvard, Vancouver, ISO, and other styles
5

Tanang Anugrah, Faula, Syariful Ikhwan, and Jafaruddin Gusti A.G. "Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection." Techné : Jurnal Ilmiah Elektroteknika 21, no. 2 (2022): 199–210. http://dx.doi.org/10.31358/techne.v21i2.320.

Full text
Abstract:
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter response time. Penelitian ini dilakukan di dalam sebuah Laboratorium fakultas dengan menggunakan topologi jaringan LAN yang di setting static. Suricata sebagai tool IPS terinstal pada PC yang berfungsi sebagai router sekaligus server IPS. Normal user dan attacker menggunakan sistem operasi Windows 10 sedangkan webserver dan server IPS menggunakan sistem operasi Ubuntu 20.04. Pengujian sistem keamanan dilakukan dengan menggunakan dua skenario yaitu skenario pertama ketika suricata non aktif dan skenario kedua ketika suricata aktif. Pengujian response time untuk semua skenario dilakukan sebanyak 30 kali selama serangan SQL Injection berlangsung. Hasil dari pengujian tersebut menunjukkan nilai rata-rata saat Suricata aktif 4,260633 milliseconds sedangkan ketika Suricata non-aktif 3,100033 milliseconds. Suricata pada penelitian ini berhasil berperan sebagai IPS yang bekerja setiap terjadinya serangan SQL Injection akan dideteksi oleh Suricata dengan melakukan pengecekan kecocokan paket terhadap signature rules. Rules yang dinilai efektif untuk menghadapi serangan sql Injection adalah rules yang menggunakan beberapa kode ASCII sebagai kata kuncinya. Server IPS ketika suricata aktif membutuhkan waktu yang lebih lama untuk menanggapi suatu paket.
APA, Harvard, Vancouver, ISO, and other styles
6

Dulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.

Full text
Abstract:
A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS), proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS) are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Jian, Hua Guo, and Zhong Zhang. "Research on High Performance Intrusion Prevention System Based on Suricata." Highlights in Science, Engineering and Technology 7 (August 3, 2022): 238–45. http://dx.doi.org/10.54097/hset.v7i.1077.

Full text
Abstract:
Suricata is an open source, high-performance network IDS, IPS and network security monitoring engine. Based on Suricata and AF-PACKET technology, this paper research on the Suricata IPS applied to Huawei Kunpeng 920 CPU and Galaxy Kylin operating system, designs defense rules for common network threats at present, and tuning the performance of Suricata IPS in a high-traffic network environment. Using Ixia network tester, the results show that the design scheme can fully adapt to the relevant hardware system and software environment, the network throughput can reach 20Gbps.
APA, Harvard, Vancouver, ISO, and other styles
8

Nadir Ali, Mohammed, Madihah Mohd Saudi, Touhid Bhuiyan, and Azreena Abu Bakar. "Comparative Study of Traditional and Next Generation IPS." International Journal of Engineering & Technology 7, no. 4.15 (2018): 55. http://dx.doi.org/10.14419/ijet.v7i4.15.21371.

Full text
Abstract:
Currently, cyber threats and attacks become a main concern among Internet users. To detect and prevent new and unknown attacks, an intelligent intrusion prevention system (IPS) which is better compared with traditional systems is needed. Furthermore, the Next Generation Intrusion Prevention System (NIGPS) is more suitable that could provide an intelligent IPS solution for new and unknown attacks. Therefore, this paper presents the limitation of traditional IPS systems, a comparison between IPS and NIGPS and proposes an enhanced model for NIGPS.
APA, Harvard, Vancouver, ISO, and other styles
9

Ardiyanto, Yudhi. "Portabel Intrusion Prevention System Untuk Mengamankan Koneksi Internet Saat Menggunakan WiFi Publik." Jurnal Sisfokom (Sistem Informasi dan Komputer) 11, no. 1 (2022): 107–13. http://dx.doi.org/10.32736/sisfokom.v11i1.1223.

Full text
Abstract:
Saat ini hampir semua tempat umum menyediakan fasilitas Wireless Fidelity (WiFi) publik. Pengguna yang terkoneksi melalui fasilitas tersebut terkadang sering abai terhadap faktor keamanan data dan jaringan, yang terpenting bagi mereka adalah dapat menikmati akses internet secara gratis. Dari sisi keamanan WiFi publik cukup rentan karena jaringan ini bisa saja dipergunakan oleh pihak-pihak yang kurang bertanggung jawab untuk mengambil data penting dari para penggunanya, karena dari segi akses tidak ada pembatasan. Tujuan dari penelitian ini adalah untuk mengembangkan sistem yang berfungsi sebagai router gateway dan sistem yang mampu mencegah terhadap upaya serangan yang berjalan pada perangkat mini komputer. Penelitian ini menggunakan metode Intrusion Prevention System (IPS), dimana sistem ini mampu mendeteksi sekaligus melakukan pencegahan adanya serangan. Dari hasil penelitian diperoleh bahwa portabel IPS telah berhasil dikembangkan dengan menggunakan Raspberry Pi 4 Model B dilengkapi dengan LCD TFT 3,50 inch dan catu daya dengan kapasitas 10.000 mAh serta Suricata yang dikonfigurasi sebagai IPS. Serangan berupa port scanning menggunakan aplikasi zenmap berhasil dideteksi oleh portabel IPS. Selain berfungsi sebagai IPS perangkat ini mampu menjadi router gateway. Catu daya portabel IPS mampu bertahan selama 34611,22 detik dengan sebuah smartphone sebagai client.
APA, Harvard, Vancouver, ISO, and other styles
10

Tambunan, Bosman, Willy Sudiarto Raharjo, and Joko Purwadi. "Desain dan Implementasi Honeypot dengan Fwsnort dan PSAD sebagai Intrusion Prevention System." Jurnal ULTIMA Computing 5, no. 1 (2013): 1–7. http://dx.doi.org/10.31937/sk.v5i1.283.

Full text
Abstract:
Teknologi Internet saat ini tidak lepas dari banyak masalah ataupun celah keamanan. Banyaknya celah keamanan ini dimanfaatkan oleh orang yang tidak berhak untuk mencuri data-data penting. Kasus serangan terjadi karena pihak yang diserang juga tidak menyadari pentingnya keamanan jaringan untuk diterapkan pada sistem yang dimiliki. Honeypot yang dipadu dengan IPS menggunakan PSAD dan Fwsnort memberikan solusi untuk masalah tersebut. IPS berfungsi sebagai sistem yang bekerja memantau aktivitas jaringan yang melalui sistem IPS pada mode inline dan memblokir alamat IP yang mencurigakan setelah data stream dicocokan dengan signature yang ada, sedangkan Honeypot bekerja untuk mengetahui aktivitas penyerang dan semua aktivitas yang menuju pada honeypot dianggap mencurigakan. Hasil penelitian menunjukkan bahwa kemampuan Honeypot yang dipadu dengan IPS PSAD dan Fwsnort dapat saling melengkapi dalam mendeteksi serangan yang tidak diketahui oleh sistem IPS. Sistem ini juga menghasilkan log data yang dapat digunakan oleh administrator dalam menanggulangi serangan yang terjadi.
 Kata kunci—intrusion prevention system, honeypot, psad, fwsnort, honeyd
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Instrusion Prevention System (IPS)"

1

Dubell, Michael, and David Johansson. "Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23347.

Full text
Abstract:
Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet. I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket. Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt. Slutsatsen är att endast brandväggar och antivirusprogram inte ger ett fullgott skydd.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Instrusion Prevention System (IPS)"

1

Ashoor, Asmaa Shaker, and Sharad Gore. "Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." In Advances in Network Security and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Panda, Bijaya Kumar, Manoranjan Pradhan, and Sateesh Kumar Pradhan. "Intrusion Prevention System." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch058.

Full text
Abstract:
In the last decade, there is a rapid growth in the use of Internet by the organization for information sharing. As information is very vital to the organizations, it should be preserved and insulated from any unauthorized access or alternation. In last few years, attacks on the computer infrastructures have increased exponentially. Several information security techniques are available now a days like firewalls, anti-virus software and Intrusion prevention systems (IPSs), which are important tools for protecting an organization from intrusions. Now most attacks are impossible to defend with firewalls and anti-virus software alone. Without an IPS, such attacks are difficult to detect and prevent. This chapter presents different definitions of intrusion prevention system with meaningful explanation; compare network IPS with Host IPS, common and the advanced detection methods, common IPS components, coverage of attacks by IPS and criteria to select right IPS. Finally, this chapter concludes with an analysis of the challenges that still remain to be resolved.
APA, Harvard, Vancouver, ISO, and other styles
3

Panda, Bijaya Kumar, Manoranjan Pradhan, and Sateesh Kumar Pradhan. "Intrusion Prevention System." In Network Security Attacks and Countermeasures. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8761-5.ch010.

Full text
Abstract:
In the last decade, there is a rapid growth in the use of Internet by the organization for information sharing. As information is very vital to the organizations, it should be preserved and insulated from any unauthorized access or alternation. In last few years, attacks on the computer infrastructures have increased exponentially. Several information security techniques are available now a days like firewalls, anti-virus software and Intrusion prevention systems (IPSs), which are important tools for protecting an organization from intrusions. Now most attacks are impossible to defend with firewalls and anti-virus software alone. Without an IPS, such attacks are difficult to detect and prevent. This chapter presents different definitions of intrusion prevention system with meaningful explanation; compare network IPS with Host IPS, common and the advanced detection methods, common IPS components, coverage of attacks by IPS and criteria to select right IPS. Finally, this chapter concludes with an analysis of the challenges that still remain to be resolved.
APA, Harvard, Vancouver, ISO, and other styles
4

Emmadisetty, Sharanya, Sreya Tirumalaraju, M. Sree Pranav Reddy, N. Sandeep Chaitanya, and Chandana Sankarapuram. "INTRUSION DETECTION AND PREVENTION SYSTEM." In Futuristic Trends in Computing Technologies and Data Sciences Volume 3 Book 4. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bict4p1ch1.

Full text
Abstract:
The rapid growth of technology in different fields has led to a great need for various services as they are an essential component in any domain’s operation and performance. With this advancement, there’s a huge rise in the effects caused by cyber- attacks. There’s a burning need to prevent this type of attacks and intrusions and its after affects. An essential instrument for monitoring, identifying and preventing intrusion threats is the INTRUSION PREVENTION SYSTEM (IPS).With a focus on datasets, ML methods, and metrics, this study tries to analyze recent Intrusion Prevention System research using a Machine Learning approach. An intrusion detector needs to be built to distinguish between safe normal connections and bad intrusions or attacks. The system's prevention model takes necessary action to reduce or restrict the extent to which the intrusion can damage the system. However, the dynamic and complex nature of cyber- attacks on computer networks cannot be handled by most techniques used in today's Intrusion Detection & Prevention System. Therefore, higher detection rates, lower false alarm rates and low computation and communication costs can be achieved by efficient adaptive methods such as various machine learning techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Pandu, Vetrivelan, Jagannath Mohan, and T. S. Pradeep Kumar. "Network Intrusion Detection and Prevention Systems for Attacks in IoT Systems." In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8241-0.ch006.

Full text
Abstract:
Internet of things (IoT) has transformed greatly the improved way of business through machine-to-machine (M2M) communications. This vast network and its associated technologies have opened the doors to an increasing number of security threats which are dangerous to IoT and 5G wireless networks. The first part of this chapter presents instruction detection system (IDS) which detect the various attacks in 6LoWPAN layer. An IDS is to detect and analyze both inbound and outbound network traffic for abnormal activities. An IPS complements an IDS configuration by proactively inspecting a system's incoming traffic to weed out malicious requests. A typical IPS configuration uses web application firewalls and traffic filtering solutions to secure applications. An IPS prevents attacks by dropping malicious packets, blocking offending IPs and alerting security personnel to potential threats. Machine learning (ML)-based instruction detection and prevention system (IDPS) is proposed and implemented in Contiki simulation environment.
APA, Harvard, Vancouver, ISO, and other styles
6

Deva Kirubai, J. Christina, and S. Silvia Priscila. "Artificial Neural Network-Based Efficient Cyber Hacking Detection System Using Deep Learning Approaches." In Explainable AI Applications for Human Behavior Analysis. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1355-8.ch013.

Full text
Abstract:
Cyber hacking can be defined as the process of observing the incidents happening in a computer network or system and inspecting them for indications of possible incidents, which includes either violation or threats of violation in the policies of computer security, the allowable use of policies or the practices of maintaining standard security. CHS aid the network in automating the process of intrusion detection. CHPS is software that consists of all the abilities of the anomalies. In addition, it also strives to widen the possible incidents and cyber hacking methodologies with similar abilities. In the case of CHPS, it allows administrators to turn off prevention attributes in anomaly products, making them work as a cyber hacking system. Respectively, for compressing the benefits of both IPS and CHS, a novel term, cyber hacking, and prevention systems (CHPS), is used for all the further chapters to infer both CHS and IPS approaches. In this research, three algorithms, namely decision stump method (DSM), support vector machine (SVM), and artificial neural network (ANN), were used. From the results obtained, the proposed ANNAccuracy of 92.3%, MSE of 0.000119, Log Loss of 0.4288, and Mathews Coefficient of 0.9010 were proposed. The tool used is Jupyter Notebook, and the language used is Python.
APA, Harvard, Vancouver, ISO, and other styles
7

Mahboub, Sara A., Elmustafa Sayed Ali Ahmed, and Rashid A. Saeed. "Smart IDS and IPS for Cyber-Physical Systems." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5101-1.ch006.

Full text
Abstract:
One of the most important requirements is security and accessibility efforts which are represented as a critical issue that should be considered in many applications for the purpose of system confidentiality and safety. To ensure the security of current and emerging CPSs by taking into consideration the unique challenges present in this environment, development of current security mechanisms should be further studied and deployed in a manner that make it becomes more compatible with CPS environment, introduce a safer environment and maintain the quality of service at the same time. Systems known as intrusion detection systems (IDS) and intrusion prevention systems (IPS) are the most common security mechanisms used in networking and communication applications. These systems are based on artificial intelligence (AI) where computer-based algorithms are used to analyze, diagnose, and recognize that threats pattern according to an expected suspicious pattern.
APA, Harvard, Vancouver, ISO, and other styles
8

Kattamuri, Sreerama Murthy, Vijayalakshmi Kakulapati, and Pallam Setty S. "Performance Analysis of Mail Clients on Low Cost Computer With ELGamal and RSA Using SNORT." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3870-7.ch020.

Full text
Abstract:
An intrusion detection system (IDS) focuses on determining malicious tasks by verifying network traffic and informing the network administrator for restricting the user or source or source IP address from accessing the network. SNORT is an open source intrusion detection system (IDS) and SNORT also acts as an intrusion prevention system (IPS) for monitoring and prevention of security attacks on networks. The authors applied encryption for text files by using cryptographic algorithms like Elgamal and RSA. This chapter tested the performance of mail clients in low cost, low power computer Raspberry Pi, and verified that SNORT is efficient for both algorithms. Within low cost, low power computer, they observed that as the size of the file increases, the run time is constant for compressed data; whereas in plain text, it changed significantly.
APA, Harvard, Vancouver, ISO, and other styles
9

Kudin, Anton, Volodymyr Tkach, Oleksii Baranovskyi, and Bogdan Carbunar. "A Distributed System for Early Intrusion Detection and Assessment of Cybersecurity." In Blockchain - Pioneering the Web3 Infrastructure for an Intelligent Future [Working Title]. IntechOpen, 2025. https://doi.org/10.5772/intechopen.1007155.

Full text
Abstract:
Centralized intrusion detection and prevention systems (IDS/IPS) and Security Information Event Management (SIEM) systems often fail to analyze and respond to information and cybersecurity threats that occur in distributed and heavily loaded environments due to computational, storage, and license limitations. In this chapter, we propose a novel distributed hierarchical system concept for early intrusion detection and subsequent assessment of cyber and information security risks based on anomalous behavior analysis without using predefined patterns. The developed approach aims to increase the security of distributed systems against decentralized attacks including both DDoS and non-specific, non-DDoS attacks, such as advanced persistent threats (APT) conducted by high-skilled cybercrimes and state-sponsored adversaries. We expect the proposed concept to improve the performance of SIEM systems compared to centralized solutions. The increasing productivity effectiveness indicator depends on the possible number of hierarchy levels in the analyzed systems (the possibility of their decomposition into subsystems).
APA, Harvard, Vancouver, ISO, and other styles
10

Do Nascimento, Pablo Pessoa, Isac F. A. F. Colares, Ronierison Maciel, Humberto Caetano Da Silva, and Paulo Maciel. "Prediction, Detection, and Mitigation of DDoS Attacks Using HPCs." In Handbook of Research on Cyber Crime and Information Privacy. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5728-0.ch025.

Full text
Abstract:
Web service interruptions caused by DDoS (distributed denial of service) attacks have increased considerably over the years, and intrusion detection systems (IDS) are not enough to detect threats on the network, even when used together with intrusion prevention systems (IPS), taking into account the increase of assets in the traffic path, where it creates unique points of failure in the system, and also taking into account the use of data that contains information about normal traffic situations and attacks, where this comparison and analysis can cost a significant amount of host resources, to try to guarantee the prediction, detection, and mitigation of attacks in real-time or in time between detection and mitigation, being crucial in harm reduction. This chapter presents an adaptive architecture that combines techniques, methods, and tools from different segments to improve detection accuracy as well as the prediction and mitigation of these threats and to show that it is capable of implementing a powerful architecture against this type of threat, DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Instrusion Prevention System (IPS)"

1

Syafril, Weny Irma, Bongga Arifwidodo, and Dadiek Pranindito. "Analysis Of Intrusion Prevention System (IPS) On Software Defined Network (SDN) In Preventing Distributed Denial of Service (DDoS) Attacks." In 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2024. https://doi.org/10.1109/comnetsat63286.2024.10862191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Denes, Istvan, and Sándor Semperger. "Improvement of Physical Security through Continuous Authentication for SCADA and DCS Systems in Industrial Automation and Control Systems." In 10th International Scientific Conference on Advances in Mechanical Engineering. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-nl1llk.

Full text
Abstract:
As the treat landscape in Operational Technology (OT) cyber security is getting more complicated, there is a general demand in most industries to increase the Target Security Level (SL-T) of Industry Automation and Control Systems (IACS). More sophisticated treat actors with higher motivation are on stage, and treat actors are getting increasingly familiar with IACS. Yet some security controls, widely used in Information Technology, are often hard to implement in IACS. Inability to go away from obsolete Operational System (OS), using shared accounts for operators, limited applicability of security patching, limited applicability of multifactor authentication, Intrusion Prevention Systems (IPS) are specific challenges of IACS security, caused mainly by real time operation and safety requirements. One way to reach SL-T is introducing compensating controls. For instance, if the use of an obsolete, unpatched SCADA system is unavoidable, security monitoring or physical security can be increased to compensate the lack of direct control. This paper aims to elaborate the compensating effect of continuous authentication as a mean of Identification and Authentication (I&A) for the operating room workstations of obsolete SCADA and DCS systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Padmashani, R., Shiju Sathyadevan, and Devi Dath. "BSnort IPS Better Snort Intrusion Detection / Prevention System." In 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2012. http://dx.doi.org/10.1109/isda.2012.6416511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pratama, Rifqi Fauzan, Novian Anggis Suwastika, and Muhammad Arief Nugroho. "Design and Implementation Adaptive Intrusion Prevention System (IPS) for Attack Prevention in Software-Defined Network (SDN) Architecture." In 2018 6th International Conference on Information and Communication Technology (ICoICT). IEEE, 2018. http://dx.doi.org/10.1109/icoict.2018.8528735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hock, Filip, and Peter Kortis. "Commercial and open-source based Intrusion Detection System and Intrusion Prevention System (IDS/IPS) design for an IP networks." In 2015 13th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2015. http://dx.doi.org/10.1109/iceta.2015.7558466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Urazov, Aibek, and Iliyas Zholshybekuly. "Integrated Production Schedule." In SPE Caspian Technical Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/217584-ms.

Full text
Abstract:
Abstract The focus of this comprehensive study is the mitigation and prevention of incidents that may lead to potential production loss (LPO) at the Tengiz and Korolev fields, two vital components of the oil and gas industry. These fields confront numerous challenges in production and ongoing operational activities. The primary objective of this research is the development and implementation of an integrated production schedule (IPS) in conjunction with a reservoir simulation model to foresee field production performances and proactively manage production operations. The core of this process revolves around the creation of an all-encompassing IPS that covers the entire spectrum of field operations, encompassing maintenance and various capital projects. This IPS, once established, becomes the cornerstone for a reservoir simulation model that harnesses its data to predict and optimize field production performances. Consequently, this strategic integration enables the efficient administration of production activities. The principal goal of this study is to ensure that through schedule optimization, the minimization of system downtime, effective management of reserve potential, and anticipation of potential LPO scenarios become feasible. The findings derived from this research underscore the practicality and efficacy of employing IPS in tandem with a reservoir hydrodynamic model to guide the operational decisions of company. These powerful tools empower company to proactively anticipate capacity constraints, optimize whitespace utilization, and predict LPO scenarios. This proactive management strategy, which is pivotal for achieving peak performance at the Tengiz and Korolev fields, heavily relies on forecasts generated from both the IPS use cases and white space projections. The account put forth here explores the utilization of Integrated Production Schedule (IPS) in the petroleum and gas industry, suggesting a new and ground-breaking method. This approach is characterized by combining advanced modeling methodologies with an assertive attitude to counteract Lost Production Opportunities (LPO). The two-fold tactic increases understanding within this sector while also supplying beneficial enlightenment on ways field management operations could possibly be upgraded or made more efficient." Building further on the key notions and principles outlined in this synopsis, it is important to underscore the importance of implementing IPS and a reservoir simulation model within petroleum and natural gas sectors. The Tengiz and Korolev fields hold pivotal resources, thus their optimal functioning not only benefits stakeholders but also contributes vastly towards wider energy markets. Given how variable these industries can be, complications are expectedly bound to arise; hence an integrated execution of an IPS helps provide thorough countermeasures for such issues. The holistic method of Integrated Production Scheduling (IPS) offers a deliberate solution to oversee field activities. It includes everything, ranging from the routine upkeep duties to capital projects on a grand scale. Generating an IPS that extends over this broad range permits operators gain comprehensive insight into their operations. This not only boosts every day selections but also aids in long-term strategizing and distribution of resources. The inclusion of a reservoir simulation model significantly amplifies the competency of IPS. This provision helps field operators to forecast production outcomes under an array of circumstances, taking into account facets like fluid characteristics, well performance and reserve pressure. By emulating these situations, they can utilize information effectively for optimizing yield while also foreseeing possible complications. A central advantage with both IPS and reservoir simulation lies within its capacity to actively steer efforts towards output management; this is particularly relevant considering potential LPO cases. Recognizing scenarios in which productivity may be endangered allows measures in prevention ensuring continual operation flow are taken by production planning consultants proactively. Not only does such anticipatory action help reduce downtime but it credits resourceful efficiency too. Moreover, the integration of IPS and reservoir simulation plays a significant role in harnessing reserve potential. A deeper comprehension of reservoir dynamics allows operators to make educated decisions regarding both new well development and existing ones’ optimization. This enhances hydrocarbon recovery whilst consistently ensuring field sustainability. The whitespace notion is introduced as crucial within this analysis—an embodiment of surplus production capacity that may be utilized when necessary. Successful management of such whitespace permits operators swift reaction times towards abrupt demand fluctuations or unexpected productivity hurdles - an essential aspect considering oil and gas industry's rapidly shifting market environment. In summarization, the incorporation of Integrated Production Schedule along with reservoir simulation models signifies a revolutionary stride in petroleum and gas industry. It provides production consultant an advanced comprehensive method for field administration allowing them to enhance production, predict probable difficulties and make well-informed choices. This research validates not just the practicality but also the efficacy of these planning methods; its influence extends beyond Tengiz & Korolev territories into broader industry realms as well. As shifts occur within production operation dynamics, such inventive measures secure their pivotal place in aiding efficient yet lasting productivity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography