To see the other types of publications on this topic, follow the link: Intrusion Prevention System.

Journal articles on the topic 'Intrusion Prevention System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Intrusion Prevention System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.

Full text
Abstract:
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathw
APA, Harvard, Vancouver, ISO, and other styles
2

Ninawe, Shreyash, Vilas Bariyekar, and Ranjita Asati. "Network Intrusion Prevention System." IJARCCE 8, no. 2 (2019): 196–99. http://dx.doi.org/10.17148/ijarcce.2019.8235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farhaoui, Yousef. "Intrusion Prevention System Inspired Immune Systems." Indonesian Journal of Electrical Engineering and Computer Science 2, no. 1 (2016): 168. http://dx.doi.org/10.11591/ijeecs.v2.i1.pp168-179.

Full text
Abstract:
<p>In view of new communication and information technologies that appeared with the emergence of networks and Internet, the computer security became a major challenge, and works in this research axis are increasingly numerous. Various tools and mechanisms are developed in order to guarantee a safety level up to the requirements of modern life. Among them, intrusion detection and prevention systems (IDPS) intended to locate activities or abnormal behaviors suspect to be detrimental to the correct operation of the system. The purpose of this work is the design and the realization of an IDP
APA, Harvard, Vancouver, ISO, and other styles
4

Stiawan, Deris, Abdul Hanan Abdullah, and Mohd Yazid Idris. "Characterizing Network Intrusion Prevention System." International Journal of Computer Applications 14, no. 1 (2011): 11–18. http://dx.doi.org/10.5120/1811-2439.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Neha, Deepali Virmani, and Xiao-Zhi Gao. "A Fuzzy Logic-Based Method to Avert Intrusions in Wireless Sensor Networks Using WSN-DS Dataset." International Journal of Computational Intelligence and Applications 19, no. 03 (2020): 2050018. http://dx.doi.org/10.1142/s1469026820500182.

Full text
Abstract:
Intrusion is one of the biggest problems in wireless sensor networks. Because of the evolution in wired and wireless mechanization, various archetypes are used for communication. But security is the major concern as networks are more prone to intrusions. An intrusion can be dealt in two ways: either by detecting an intrusion in a wireless sensor network or by preventing an intrusion in a wireless sensor network. Many researchers are working on detecting intrusions and less emphasis is given on intrusion prevention. One of the modern techniques for averting intrusions is through fuzzy logic. In
APA, Harvard, Vancouver, ISO, and other styles
6

Safana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.

Full text
Abstract:
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS detect
APA, Harvard, Vancouver, ISO, and other styles
7

Safana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.

Full text
Abstract:
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate  a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS
APA, Harvard, Vancouver, ISO, and other styles
8

Sharma, Himanshu, Prabhat Kumar, and Kavita Sharma. "Recurrent Neural Network based Incremental model for Intrusion Detection System in IoT." Scalable Computing: Practice and Experience 25, no. 5 (2024): 3778–95. http://dx.doi.org/10.12694/scpe.v25i5.3004.

Full text
Abstract:
The security of Internet of Things (IoT) networks has become a integral problem in view of the exponential growth of IoT devices. Intrusion detection and prevention is an approach ,used to identify, analyze, and block cyber threats to protect IoT from unauthorized access or attacks. This paper introduces an adaptive and incremental intrusion detection and prevention system based on RNNs, to the ever changing field of IoT security. IoT networks require advanced intrusion detection systems that can identify emerging threats because of their various and dynamic data sources. The complexity of IoT
APA, Harvard, Vancouver, ISO, and other styles
9

Su, Thawda Win. "Survival of an Intrusion Tolerance Database System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1748–51. https://doi.org/10.5281/zenodo.3591410.

Full text
Abstract:
While traditional secure database systems rely on prevention control and are very limited in surviving malicious attack, an intrusion tolerant database system can operate through attacks in such a way that the system can continue delivering essential services in the face of attacks. The emphasis of survivability is on continuity of operations, with the understanding that the security precautions cannot guarantee that systems will not be penetrated and compromised. In this paper, we propose a framework of model based evaluation of the survivable intrusion tolerant database system. We focus on m
APA, Harvard, Vancouver, ISO, and other styles
10

Tasneem, Aaliya, Abhishek Kumar, and Shabnam Sharma. "Intrusion Detection Prevention System using SNORT." International Journal of Computer Applications 181, no. 32 (2018): 21–24. http://dx.doi.org/10.5120/ijca2018918280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Chauhan, Shivam Kumar, Abhishek Sharma, and Avinash Kaur. "Animal Intrusion Detection and Prevention System." International Journal of Computer and Organization Trends 11, no. 2 (2021): 25–28. http://dx.doi.org/10.14445/22492593/ijcot-v11i2p308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Bhatnagar, Prerna. "Smart Security and Intrusion Prevention System." International Journal for Research in Applied Science and Engineering Technology 7, no. 11 (2019): 908–10. http://dx.doi.org/10.22214/ijraset.2019.11153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Subasree, S., Michael Jeniston S. Christ, M. Harish, V. Jeevaranjan, and S. Manikandan. "Enhanced Security through Intrusion Detection and Prevention System." Recent Trends in Cyber Criminology Research 1, no. 2 (2025): 1–5. https://doi.org/10.5281/zenodo.15582270.

Full text
Abstract:
<em>This paper presents the design, implementation, and evaluation of a rule-based Intrusion Detection and Prevention System (IDPS) for network security. The proposed system employs signature-based detection, anomaly-based heuristics, and active prevention techniques to detect and mitigate various types of network intrusions with high efficiency. The system was developed to address the growing challenges in network security by providing a lightweight and effective approach that does not rely on machine learning algorithms. Our implementation utilizes Scapy for packet manipulation, custom rule
APA, Harvard, Vancouver, ISO, and other styles
14

Sreenivasa Reddy, G., and G. Shyama Chandra Prasad. "INTRUSION DETECTION SYSTEM USING CLUSTERING ALGORITHMS OF NEURAL NETWORKS." International Journal of Advanced Research 11, no. 11 (2023): 607–14. http://dx.doi.org/10.21474/ijar01/17861.

Full text
Abstract:
This research paper explores the application of clustering algorithms in neural networks for enhancing Intrusion Detection Systems (IDS). Intrusion Detection Systems are critical in safeguarding information systems from unauthorized access, misuse, or damage. The dynamic nature of cyber threats necessitates advanced approaches for detection and prevention. Neural networks, with their ability to learn and adapt, offer significant potential in identifying and classifying network intrusions. This paper reviews various neural network architectures and clustering algorithms, their integration in ID
APA, Harvard, Vancouver, ISO, and other styles
15

Sharma, Gaurav, and Anil Kumar Kapil. "INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR." Acta Informatica Malaysia 5, no. 2 (2021): 58–61. http://dx.doi.org/10.26480/aim.02.2021.58.61.

Full text
Abstract:
Security becomes the main concern when the resources are shared over a network for many purposes. For ease of use and time saving several services offered by banks and other financial companies are accessible over mobile apps and computers connected with the Internet. Intrusion detection (ID) is the act of detecting actions that attempt to compromise the confidentiality, integrity, or availability of a shared resource over a network. Intrusion detection does not include the prevention of intrusions. A different solution is required for intrusion prevention. The major intrusion detection techni
APA, Harvard, Vancouver, ISO, and other styles
16

Korcak, Michal, Jaroslav Lamer, and Frantisek Jakab. "Intrusion Prevention/Intrusion Detection System (IPS/IDS) for Wifi Networks." International journal of Computer Networks & Communications 6, no. 4 (2014): 77–89. http://dx.doi.org/10.5121/ijcnc.2014.6407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chandre, Pankaj Ramchandra, Parikshit Mahalle, and Gitanjali Shinde. "Intrusion prevention system using convolutional neural network for wireless sensor network." IAES International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 504. http://dx.doi.org/10.11591/ijai.v11.i2.pp504-515.

Full text
Abstract:
Now-a-days, there is exponential growth in the field of wireless sensor network. In wireless sensor networks (WSN’s), most of communication happen through wireless media hence probability of attacks increases drastically. With the help of intrusion prevention system, we can classify user activities into two categories, normal and suspicious activity. There is need to design effective intrusion prevention system by exploring deep learning for WSN. This research aims to deal with proposing algorithms and techniques for intrusion prevention system using deep packet inspection based on deep learni
APA, Harvard, Vancouver, ISO, and other styles
18

Pankaj, Chandre, Mahalle Parikshit, and Shinde Gitanjali. "Intrusion prevention system using convolutional neural network for wireless sensor network." International Journal of Artificial Intelligence (IJ-AI) 11, no. 2 (2022): 504–15. https://doi.org/10.11591/ijai.v11.i2.pp504-515.

Full text
Abstract:
Now-a-days, there is exponential growth in the field of wireless sensor network. In wireless sensor networks (WSN&rsquo;s), most of communication happen through wireless media hence probability of attacks increases drastically. With the help of intrusion prevention system, we can classify user activities into two categories, normal and suspicious activity. There is need to design effective intrusion prevention system by exploring deep learning for WSN. This research aims to deal with proposing algorithms and techniques for intrusion prevention system using deep packet inspection based on deep
APA, Harvard, Vancouver, ISO, and other styles
19

Gandhar, Abhishek, Prakhar Priyadarshi, Shashi Gandhar, S. B. Kumar, Arvind Rehalia, and Mohit Tiwari. "An Effective Deep Learning Model Design for Cyber Intrusion Prevention System." Indian Journal Of Science And Technology 18, no. 10 (2025): 811–15. https://doi.org/10.17485/ijst/v18i10.318.

Full text
Abstract:
Objectives: The increasing frequency of cyber threats necessitates the advancement of Intrusion Prevention Systems (IPS). However, existing IPS models suffer from high false positive rates, inefficiencies in real-time detection, and suboptimal accuracy levels. Methods: This study presents a CNN-LSTM hybrid model optimized for real-time cyber intrusion detection. The CICIDS2018 dataset was utilized for training, incorporating feature selection, hyper-parameter tuning, and dropout-based regularization to improve efficiency and prevent over-fitting. Findings: The proposed system achieved an F1-sc
APA, Harvard, Vancouver, ISO, and other styles
20

Guo, Hui Ling. "Research on the Model of Database Intrusion Protection System Based on E-Commerce Platform." Applied Mechanics and Materials 336-338 (July 2013): 2559–62. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.2559.

Full text
Abstract:
Based on attack model of database,a model of database intrusion prevention system is proposed in electronic commerce platform. The model is divided into session level intrusion detection model, schema level intrusion detection model and semantic level intrusion detection model according to the abstraction level of test information. It extends the COAST firewall model with intrusion detection, and a layered intrusion prevention model which detect intrusion behavior according to session level, schema level and semantic level information of transactions. Thereby, it updates database security from
APA, Harvard, Vancouver, ISO, and other styles
21

Onwodi, Greg. "Smart Intrusion Prevention System for the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, FCT, Abuja, Nigeria." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 73–78. http://dx.doi.org/10.22624/aims/digital/v10n4p10.

Full text
Abstract:
This study examines the Smart Intrusion Prevention System for the Local Area Network of Nigeria Immigration Special Study Centre, Gwagwalada, Abuja. Different research methodologies for Intrusion Prevention System was analysed and the hybrid based methodology was adopted because of its incorporation of the other methodologies. Configuration of the Intrusion Prevention System was studied and implemented using software known as Mikrotik. The Mikrotik software configuration was analysed properly. Among the major findings of the study was that the Local Area Network of Nigeria Immigration Special
APA, Harvard, Vancouver, ISO, and other styles
22

Anand, Saloni, and Kshitij Patne. "Network Intrusion Detection and Prevention." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 3754–59. http://dx.doi.org/10.22214/ijraset.2022.44761.

Full text
Abstract:
Abstract: Intrusion Detection systems are now increasingly significant in network security. As the number of people using the internet grows, so does the chance of a cyberattack. People are adopting signature-based intrusion detection systems. Snort is a popular open-source signature-based intrusion detection system. It is widely utilised in the intrusion detection and prevention arena across the world. The aim of this research is to provide knowledge about intrusion detection systems, application vulnerabilities, and their prevention methods and to perform a comparison of the latest tools and
APA, Harvard, Vancouver, ISO, and other styles
23

Shirsat,, Yashraj. "Smart Farmland for Crop Prevention & Animal Intrusion Detection Using IOT." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41299.

Full text
Abstract:
In modern agriculture, protecting crops and liv estock from intrusions and ensuring their safety is crucial for maintaining farm productivity and reducing losses. This project introduces a smart farmland management system utilizing IoT technologies to detect and prevent animal intrusions. The system employs a Raspberry Pi coupled with a camera to monitor the farmland continuously. When the camera detects the presence of animals, it triggers a buzzer to deter the intruders, creating an immediate response to protect the crops. This real-time intervention helps minimize potential damage and keeps
APA, Harvard, Vancouver, ISO, and other styles
24

Murugan, S., and K. Kuppusamy. "Intelligence Intrusion Multi Detection Prevention System Principles." i-manager's Journal on Software Engineering 10, no. 1 (2015): 31–41. http://dx.doi.org/10.26634/jse.10.1.3630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bocu, Razvan, and Maksim Iavich. "Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks." Symmetry 15, no. 1 (2022): 110. http://dx.doi.org/10.3390/sym15010110.

Full text
Abstract:
The philosophy of the IoT world is becoming important for a projected, always-connected world. The 5G networks will significantly improve the value of 4G networks in the day-to-day world, making them fundamental to the next-generation IoT device networks. This article presents the current advances in the improvement of the standards, which simulate 5G networks. This article evaluates the experience that the authors gained when implementing Vodafone Romania 5G network services, illustrates the experience gained in context by analyzing relevant peer-to-peer work and used technologies, and outlin
APA, Harvard, Vancouver, ISO, and other styles
26

Ugale, Archana R., and Amol D. Potgantwar. "Anomaly Based Intrusion Detection through Efficient Machine Learning Model." International Journal of Electrical and Electronics Research 11, no. 2 (2023): 616–22. http://dx.doi.org/10.37391/ijeer.110251.

Full text
Abstract:
Machine learning is commonly utilised to construct an intrusion detection system (IDS) that automatically detects and classifies network intrusions and host-level threats. Malicious assaults change and occur in high numbers, needing a scalable solution. Cyber security researchers may use public malware databases for research and related work. No research has examined machine learning algorithm performance on publicly accessible datasets. Data and physical level security and analysis for Data protection have become more important as data volumes grow. IDSs collect and analyse data to identify s
APA, Harvard, Vancouver, ISO, and other styles
27

S, Bhaggiaraj, Shanthini S, Sugantha Mallika S.S., and Muthuram R. "NEXT-GENERATION INTRUSION DETECTION AND PREVENTION SYSTEMS FOR IT AND NETWORK SECURITY." ICTACT Journal on Communication Technology 14, no. 3 (2023): 2992–97. http://dx.doi.org/10.21917/ijct.2023.0445.

Full text
Abstract:
In cybersecurity, the constant evolution of threats demands the development of next-generation Intrusion Detection and Prevention Systems (IDPS) to safeguard IT infrastructure and networks effectively. This research embarks on the journey of designing an innovative IDPS using a Dense VGG classifier, fueled by IoT data as its primary input source. Our approach combines the robustness of the Dense VGG architecture with the rich information generated by Internet of Things (IoT) devices, enhancing the system ability to detect and prevent intrusions. We gather diverse IoT data from sensors and devi
APA, Harvard, Vancouver, ISO, and other styles
28

Jiang, Ya Ping, Shi Hui Cheng, and Yong Gan. "Network Security Prevention Model Based-Immune." Applied Mechanics and Materials 16-19 (October 2009): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amm.16-19.881.

Full text
Abstract:
With the concepts of self, nonself, antibody, vaccine and antigen in an intrusion detection and prevention system presented in this paper, the architecture of network intrusion and prevention based on immune principle is proposed. The intrusion information gotten from current monitored network is encapsulated and sent to the neighbor network as bacterin; therefore the neighbor network can make use of the bacterin and predict the danger of network. The experimental results show that the new model not only actualizes an active prevention method but also improves the ability of intrusion detectio
APA, Harvard, Vancouver, ISO, and other styles
29

Erskine, Samuel Kofi. "Real-Time Large-Scale Intrusion Detection and Prevention System (IDPS) CICIoT Dataset Traffic Assessment Based on Deep Learning." Applied System Innovation 8, no. 2 (2025): 52. https://doi.org/10.3390/asi8020052.

Full text
Abstract:
This research utilizes machine learning (ML), and especially deep learning (DL), techniques for efficient feature extraction of intrusion attacks. We use DL to provide better learning and utilize machine learning multilayer perceptron (MLP) as an intrusion detection (IDS) and intrusion prevention (IPS) system (IDPS) method. We deploy DL and MLP together as DLMLP. DLMLP improves the high detection of all intrusion attack features on the Internet of Things (IoT) device dataset, known as the CICIoT2023 dataset. We reference the CICIoT2023 dataset from the Canadian Institute of Cybersecurity (CIC)
APA, Harvard, Vancouver, ISO, and other styles
30

Erlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.

Full text
Abstract:
Computer network security is an important factor that must be considered. Guaranteed security can avoid losses caused by attacks on the network security system. The most common prevention against network attacks is to place an administrator, but problems will arise when the administrator is not supervising the network, so to overcome these problems a system called IDS (Intrusion Detection System) can detect suspicious activity on the network through automating the work functions of an administrator. Snort is one of the software that functions to find out the intrusion. Data packets that pass t
APA, Harvard, Vancouver, ISO, and other styles
31

Suryayusra, Suryayusra, and Dedi Irawan. "PERBANDINGAN INTRUSION PREVENTION SYSTEM (IPS) PADA LINUX UBUNTU DAN LINUX CENTOS." Jurnal Teknologi Informasi Mura 12, no. 02 (2020): 131–44. http://dx.doi.org/10.32767/jti.v12i02.1023.

Full text
Abstract:
Perkembangan teknologi yang Semakin hari semakin meningkat, kita di tuntut untuk meningkatkan system keamanan jaringan yang kita miliki, karena semakin mudahnya orang bisa mengetahui tentang hacking dan cracking dan juga didukung oleh tools yang mudah didapatkan secara gratis. Dan untuk mencegah hal itu kita harus megamankan jaringan yang kita gunakan, untuk mengamankan jaringan tersebut peneliti menggunakan sebuah metode keamanan yang bernama Intrusion Prevention System (IPS), merupakan media yang banyak digunakan dalam membangun sebuah system keamanan komputer, lalu IPS di gabungkan dengan m
APA, Harvard, Vancouver, ISO, and other styles
32

Vargas Martínez, Cyntia, and Birgit Vogel-Heuser. "Towards Industrial Intrusion Prevention Systems: A Concept and Implementation for Reactive Protection." Applied Sciences 8, no. 12 (2018): 2460. http://dx.doi.org/10.3390/app8122460.

Full text
Abstract:
System intrusions violate the security of a system. In order to maintain it, it is necessary to decrease the chances of intrusions occurring or by detecting them as soon as they ensue in order to respond to them in a timely manner. These responses are divided in two types: passive or reactive responses. Passive responses are limited to only notification and alerting; whereas, reactive responses influence the intrusion by undoing or diminishing its consequences. Unfortunately, some reactive responses may influence the underlying system where the intrusion has occurred. This is especially a conc
APA, Harvard, Vancouver, ISO, and other styles
33

Benisha, R. B., and S. Raja Ratna. "Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks." Security and Communication Networks 2019 (November 22, 2019): 1–12. http://dx.doi.org/10.1155/2019/1082485.

Full text
Abstract:
Intrusion detection and prevention system detects malicious activities that occur in the real-time SCADA systems. This system has a problem without a profound solution. The challenge of the existing intrusion detection is accuracy in the process of detecting the anomalies. In SCADA, wind turbine data are modified by the intruders and forged details are given to the server. To overcome this, the biased intrusion detection system is used for detecting the intrusion with encrypted date, time, and file location with less false-positive and false-negative rates and thereby preventing the SCADA syst
APA, Harvard, Vancouver, ISO, and other styles
34

Thenmozhi, K., and R. Sabin Begum. "Intrusion Prevention in Cloud Computing Using Blockchain." Data Analytics and Artificial Intelligence 4, no. 3 (2024): 8–13. http://dx.doi.org/10.46632/daai/4/3/2.

Full text
Abstract:
The integration of blockchain technology with cloud computing to establish a more secure and transparent Intrusion prevention mechanism. The limitations of traditional Intrusion prevention methods, including security, transparency, and scalability challenges. Blockchain technology has emerged as a promising solution to enhance Intrusion prevention and permissions in a tamper-proof and transparent ledger in cloud computing environments. Blockchain technology has the potential to revolutionize Intrusion prevention in cloud computing by providing a more secure, transparent, and scalable framework
APA, Harvard, Vancouver, ISO, and other styles
35

Veerasingam, Prakaash, Shukor Abd Razak, Ahmad Faisal Amri Abidin, Mohamad Afendee Mohamed, and Siti Dhalila Mohd Satar. "INTRUSION DETECTION AND PREVENTION SYSTEM IN SME'S LOCAL NETWORK BY USING SURICATA." Malaysian Journal of Computing and Applied Mathematics 6, no. 1 (2023): 21–30. http://dx.doi.org/10.37231/myjcam.2023.6.1.88.

Full text
Abstract:
In the present era, Cybercriminals are increasingly focusing their attention on the local networks of SMEs. Due to the lack of resources and skilled workers in the cybersecurity field., SMEs struggle to prevent and detect fraudulent activities within their networks. To address this challenge, an Intrusion Detection and Prevention System (IDPS) is crucial for optimising network security in SMEs. This research paper explores the implementation of Suricata, an IDS/IPS tool, on a Raspberry Pi 2B embedded platform to create an effective IDPS for SMEs' the study demonstrates the viability of Suricat
APA, Harvard, Vancouver, ISO, and other styles
36

Mahesh T R, V Vivek, and Vinoth Kumar. "Implementation of Machine Learning-Based Data Mining Techniques for IDS." International Journal of Information Technology, Research and Applications 2, no. 1 (2023): 7–13. http://dx.doi.org/10.59461/ijitra.v2i1.23.

Full text
Abstract:
The internet is essential for ongoing contact in the modern world, yet its effectiveness might lessen the effect known as intrusions. Any action that negatively affects the targeted system is considered an intrusion. Network security has grown to be a major issue as a result of the Internet's rapid expansion. The Network Intrusion Detection System (IDS), which is widely used, is the primary security defensive mechanism against such hostile assaults. Data mining and machine learning technologies have been extensively employed in network intrusion detection and prevention systems to extract user
APA, Harvard, Vancouver, ISO, and other styles
37

Alazab, Ammar, Michael Hobbs, Jemal Abawajy, and Ansam Khraisat. "Malware Detection and Prevention System Based on Multi-Stage Rules." International Journal of Information Security and Privacy 7, no. 2 (2013): 29–43. http://dx.doi.org/10.4018/jisp.2013040102.

Full text
Abstract:
The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection Syst
APA, Harvard, Vancouver, ISO, and other styles
38

Ms., Deepali D. Rane, Shraddha T. Shelar Mrs., and Vinod Mane Mr. "Survey on Detection and Prevention of Intrusion." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2500–2502. https://doi.org/10.31142/ijtsrd15660.

Full text
Abstract:
Intrusion Detection and Prevention System using GSM modem is proposed, which is designed to detect unwanted attempts of accessing, manipulating and or disabling computer system. If intruder cracks or guess the password then proposed system will deny access of system resources with the help of security question known to owner of the system. Proposed system will take snapshot of intruder using webcam. Unwanted attempts can be avoided by using cell phone and GSM modem. System will send alert message to authorized user on mobile phone. Authorized user can control or prevent own machine by sending
APA, Harvard, Vancouver, ISO, and other styles
39

Tetskyi, Artem, та Artem Perepelitsyn. "Можливості використання апаратних прискорювачів у системах виявлення та запобігання вторгненням". Aerospace Technic and Technology, № 6 (21 листопада 2024): 94–102. https://doi.org/10.32620/aktt.2024.6.09.

Full text
Abstract:
The subject of this study is the capabilities of FPGA technology for cybersecurity solutions with the network interface accelerators of SmartNIC, as well as the technologies for building, deploying, supporting, and accelerating intrusion detection systems and intrusion prevention systems. The goal of this work is to increase the performance of the network protection components of modern datacenters using hardware network interface accelerator cards based on FPGA technology. The task is to analyze the classification of cyber threats, to analyze methods of detecting cyber threats, to analyze the
APA, Harvard, Vancouver, ISO, and other styles
40

Afzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.

Full text
Abstract:
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (AIDS). Network security is vital for any organization connected to the Internet. Rock
APA, Harvard, Vancouver, ISO, and other styles
41

Afzal, Shehroz, and Jamil Asim. "Systematic Literature Review over IDPS, Classification and Application in its Different Areas." STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH 3, no. 2 (2021): 189–223. http://dx.doi.org/10.52700/scir.v3i2.58.

Full text
Abstract:
Cyber-attacks are becoming more sophisticated and thereby presenting increasing challenges in accurately detecting intrusions. Failure to prevent the intrusions could degrade the credibility of security services, e.g. data confidentiality, integrity, and availability. Numerous intrusion detection methods have been proposed in the literature to tackle computer security threats, which can be broadly classified into Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (AIDS). Network security is vital for any organization connected to the Internet. Rock
APA, Harvard, Vancouver, ISO, and other styles
42

Kurniawan, Rifky, and Fajar Prakoso. "Implementasi Metode IPS (Intrusion Prevention System) dan IDS (Intrusion Detection System) untuk Meningkatkan Keamanan Jaringan." SENTINEL 3, no. 1 (2020): 231–42. http://dx.doi.org/10.56622/sentineljournal.v3i1.20.

Full text
Abstract:
Intrusion Detection System (IDS) dapat didefinisikan sebagai kegiatan yang bersifat anomaly,incorrect, inappropriate yang terjadi di jaringan atau host. Dan IDS sendiri adalah sistemkeamanan yang bekerja bersama Firewall untuk mengatasi Intrusion. IDS mampu mendeteksipenyusup dan memberikan respon secara real time. Terdapat dua teknik yang digunakandalam IDS yaitu, NIDS (Network Based Intrusion Detection System) dan HIDS (Host BasedIntrusion Detection System). Pada percobaan kali ini IDS dibagun menggunakan perangkatlunak Snort. Snort merupakan Open Source Intrusion Detection System (IDS) yang
APA, Harvard, Vancouver, ISO, and other styles
43

Khadafi, Shah, Budanis Dwi Meilani, and Samsul Arifin. "SISTEM KEAMANAN OPEN CLOUD COMPUTING MENGGUNAKAN IDS (INTRUSION DETECTION SYSTEM) DAN IPS (INTRUSION PREVENTION SYSTEM)." Jurnal IPTEK 21, no. 2 (2017): 67. http://dx.doi.org/10.31284/j.iptek.2017.v21i2.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Atmadji, Ery Setiyawan Jullev, Bekti Maryuni Susanto, and Rahardian Wiratama. "Pemanfaatan IPTables Sebagai Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS) Pada Linux Server." Teknika 6, no. 1 (2017): 19–23. http://dx.doi.org/10.34148/teknika.v6i1.55.

Full text
Abstract:
Keamanan jaringan menjadi hal yang penting untuk semua industri dan perusahaan untuk melindungi data dan informasi penting yang berada didalamnnya. Perlindungan keamanan dalam suatu jaringan umumnya berbasis pada keamanan transmisi data yang dibuat dan diaplikasikan untuk membantu mengamankan suatu jaringan tertentu. Untuk lebih mengoptimalkan pengambilan keputusan maka diperlukan sebuah mesin yang mampu berkolaborasi dengan database IDS maupun IPS, sehingga tipikal serangan yang sangat beragam dapat dipetakan dengan lebih optimal. Salah satu database yang mempunyai rule yang sudah ada adalah
APA, Harvard, Vancouver, ISO, and other styles
45

Nycz, Mariusz, Mirosław Hajder, and Alicja Gerka. "New architecture of system intrusion detection and prevention." Annales Universitatis Mariae Curie-Sklodowska, sectio AI – Informatica 16, no. 2 (2017): 20. http://dx.doi.org/10.17951/ai.2016.16.2.20.

Full text
Abstract:
&lt;p&gt;In this article there has been presented new intrusion detection and prevention algorithm implemented on Raspberry Pi platform. The paper begins with the presentation of research methodology in the field of Intrusion Detection Systems. Adequate supervision and control over network traffic is crucial for the security of information and communication technology. As a result of the limited budget allocated for the IT infrastructure of small businesses and the high price of dedicated solutions, many companies do not use mentioned systems. Therefore, in this order, there has been proposed
APA, Harvard, Vancouver, ISO, and other styles
46

Letou, Kopelo, Dhruwajita Devi, and Y. Jayanta Singh. "Host-based Intrusion Detection and Prevention System (HIDPS)." International Journal of Computer Applications 69, no. 26 (2013): 28–33. http://dx.doi.org/10.5120/12136-8419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

MaqboolBeigh, Bilal, Uzair Bashir, and Manzoor Chahcoo. "Intrusion Detection and Prevention System: Issues and Challenges." International Journal of Computer Applications 76, no. 17 (2013): 26–30. http://dx.doi.org/10.5120/13340-0701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jo, Jinyong, Heejin Jang, Kyungmin Lee, and JongUk Kong. "SDN-Based Intrusion Prevention System for Science DMZ." Journal of Korean Institute of Communications and Information Sciences 40, no. 6 (2015): 1070–80. http://dx.doi.org/10.7840/kics.2015.40.6.1070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dave, Sweta, and Prof Sandip Chauhan. "Intrusion Detection and Prevention System in IoT Environment." International Journal of Research in Advent Technology 7, no. 3 (2019): 1498–502. http://dx.doi.org/10.32622/ijrat.732019124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

LYUBENOVA, Simona, Milen PETROV та Adelina ALEKSIEVA - PETROVA. "А Graph Database Intrusion Detection and Prevention System". Eurasia Proceedings of Science Technology Engineering and Mathematics 29 (15 грудня 2024): 182–91. https://doi.org/10.55549/epstem.1566169.

Full text
Abstract:
Network threats are perceived as a serious and current problem due to the presence of different types of attacks, the purpose of which is to penetrate the security of a certain system using vulnerabilities and fraud techniques. They can appear anywhere, making them more difficult to detect and prevent. The victims of such type of attacks are constantly increasing, resulting in great losses not only in financial terms, but also in breaches of data privacy and business processes. As a result, protecting confidential information from unpredictable attacks has become a pressing issue and a difficu
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!