{"title":"An Intruder Monitoring System for Improving the Network Security","authors":"Sourav Thapliyal, Himanshu Gupta, S. Khatri","doi":"10.1109/ISCON47742.2019.9036195","DOIUrl":null,"url":null,"abstract":"As the new technologies are emerging and rapidly growing the security advisors have the focus on developing the complex solutions for monitoring and detection of the intruder. This paper proposes a model which will provide the intruder monitoring system for improving the security. The model will check for the vulnerabilities of the network and then provide the best solution to it. Based on open source software and using various networking techniques the model will be constructed to run on low – cost hardware, on demand for intruder scanning, and alerting the owner by giving alerts in case of the intrusion.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCON47742.2019.9036195","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As the new technologies are emerging and rapidly growing the security advisors have the focus on developing the complex solutions for monitoring and detection of the intruder. This paper proposes a model which will provide the intruder monitoring system for improving the security. The model will check for the vulnerabilities of the network and then provide the best solution to it. Based on open source software and using various networking techniques the model will be constructed to run on low – cost hardware, on demand for intruder scanning, and alerting the owner by giving alerts in case of the intrusion.