Skip to main content

2020 | OriginalPaper | Buchkapitel

An Integrated Approach to Network Intrusion Detection and Prevention

verfasst von : B. Bhanu Prakash, Kaki Yeswanth, M. Sai Srinivas, S. Balaji, Y. Chandra Sekhar, Aswathy K. Nair

Erschienen in: Inventive Communication and Computational Technologies

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

At present, with the expansion of size of the internet, security plays a crucial role in computer networks. Also with the advancement of Internet of things, earlier technology like firewall, authentication and encryption are not effective in ensuring the complete security. This has lead to the development of Intrusion Detection Systems (IDS) which monitors the events in computer networks to recognize the threats that violates computer security. With the help of various machine learning algorithms we have carried out the implementation of IDS. Machine learning technique increases the accuracy of anomaly detection in real-time scenario. This work focuses on K-Nearest Neighbor (KNN) classifier and Support Vector Machine (SVM), which classify the program behavior as intrusive or not. To prevent DoS (Denial-of-Service) attacks, a new method is implemented in this paper. The KNN classified data which provides malicious IP address are blocked in routers through Standard Access-list.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Prem Sankar AU, Poornachandran P, Ashok A, Manu RK, Hrudya P (2017) B-secure: a dynamic reputation system for identifying anomalous BGP paths. Adv Intell Syst Comput 515:767–775 Prem Sankar AU, Poornachandran P, Ashok A, Manu RK, Hrudya P (2017) B-secure: a dynamic reputation system for identifying anomalous BGP paths. Adv Intell Syst Comput 515:767–775
2.
Zurück zum Zitat Sankaran S, Sridhar R (2015) Modeling and analysis of routing for IoT networks. In: International conference on computing and network communications (CoCoNet). IEEE, Trivandrum, India Sankaran S, Sridhar R (2015) Modeling and analysis of routing for IoT networks. In: International conference on computing and network communications (CoCoNet). IEEE, Trivandrum, India
3.
Zurück zum Zitat Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X A Taxonomy and survey pf intrusion detection system, design techniques, network threats and datasets Hindy H, Brosset D, Bayne E, Seeam A, Tachtatzis C, Atkinson R, Bellekens X A Taxonomy and survey pf intrusion detection system, design techniques, network threats and datasets
4.
Zurück zum Zitat Vijayarani1 S, Sylviaa M Assistant Professor and M. Phil Research Scholar from the Department of Computer Science Intrusion detection system a study. Bharathiar University, Coimbatore Vijayarani1 S, Sylviaa M Assistant Professor and M. Phil Research Scholar from the Department of Computer Science Intrusion detection system a study. Bharathiar University, Coimbatore
5.
Zurück zum Zitat Paliwal S, Gupta R (2012) Denial-of-service, probing remote to user (R2L) attack detection using genetic algorithm. Int J Comput Appl Paliwal S, Gupta R (2012) Denial-of-service, probing remote to user (R2L) attack detection using genetic algorithm. Int J Comput Appl
6.
Zurück zum Zitat Panda M, Patra MR Network intrusion detection using naive bayes. Department of E TC Engineering, G.I.E.T, Gunupur, India and from Department of Computer Science, Berhampur University, Berhampur, India Panda M, Patra MR Network intrusion detection using naive bayes. Department of E TC Engineering, G.I.E.T, Gunupur, India and from Department of Computer Science, Berhampur University, Berhampur, India
7.
Zurück zum Zitat Zhang M, Xu B, Gong J (2015) An anamoly detection model based on one-class SVM to detect network intrusions. In: 11th conference on mobile ad-hoc and sensor networks Zhang M, Xu B, Gong J (2015) An anamoly detection model based on one-class SVM to detect network intrusions. In: 11th conference on mobile ad-hoc and sensor networks
8.
Zurück zum Zitat Xiaofeng Z, Xiaohong H (2017) Research on intrusion detection based on improved combination of k-means and multi-level SVM. In: K. Elissa (ed) 17th international conference on communication technology. Title of paper if known, unpublished Xiaofeng Z, Xiaohong H (2017) Research on intrusion detection based on improved combination of k-means and multi-level SVM. In: K. Elissa (ed) 17th international conference on communication technology. Title of paper if known, unpublished
9.
Zurück zum Zitat Ghanem K, Aparacio Navarro FJ, Chambers JA (2017) Support vector machine for network intrusion and cyber-attack detection. IEEE 2017 Ghanem K, Aparacio Navarro FJ, Chambers JA (2017) Support vector machine for network intrusion and cyber-attack detection. IEEE 2017
10.
Zurück zum Zitat Seo J, Lee C, Shon T, Cho K-H, Moon J (2005) A new DDoS detection model using multiple SVMs and TRA, IFIP Seo J, Lee C, Shon T, Cho K-H, Moon J (2005) A new DDoS detection model using multiple SVMs and TRA, IFIP
11.
Zurück zum Zitat Hutchins E, Cloppert M, Amin RM (2011) Intelligence-driven computer network defence informed by analysis of adversary campaigns and intrusion kill chains, USA. In: 6th International conference on warfare and security Hutchins E, Cloppert M, Amin RM (2011) Intelligence-driven computer network defence informed by analysis of adversary campaigns and intrusion kill chains, USA. In: 6th International conference on warfare and security
12.
Zurück zum Zitat Yan F, Jain-Wen Y, Lin C (2015) Computer network security and technology research. IEEE 2015 Yan F, Jain-Wen Y, Lin C (2015) Computer network security and technology research. IEEE 2015
Metadaten
Titel
An Integrated Approach to Network Intrusion Detection and Prevention
verfasst von
B. Bhanu Prakash
Kaki Yeswanth
M. Sai Srinivas
S. Balaji
Y. Chandra Sekhar
Aswathy K. Nair
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-0146-3_5

Neuer Inhalt