Innovative framework design of an intelligent detection and monitoring system (IDMS) to leverage National Security

Okonta O. Emmanuel, Ajani Dele, Okonta I. Love
{"title":"Innovative framework design of an intelligent detection and monitoring system (IDMS) to leverage National Security","authors":"Okonta O. Emmanuel, Ajani Dele, Okonta I. Love","doi":"10.47587/sa.2023.4302","DOIUrl":null,"url":null,"abstract":"Intrusion monitoring is the act of monitoring unwanted traffic on a network or a device, analysing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion detection is the process of detecting a possible compromise or events occurring in a computer system or network. An IDMS can be a piece of installed software or a physical intelligent appliance that monitors network traffic in order to detect and prevent unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. This innovative design primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, try to inoculate the system to prevent similar attacks using recognisable signature patterns and this will enhance National Security and prevent unwarranted cyber-attacks on organizations and important National resources","PeriodicalId":273863,"journal":{"name":"Science Archives","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science Archives","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47587/sa.2023.4302","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Intrusion monitoring is the act of monitoring unwanted traffic on a network or a device, analysing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion detection is the process of detecting a possible compromise or events occurring in a computer system or network. An IDMS can be a piece of installed software or a physical intelligent appliance that monitors network traffic in order to detect and prevent unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. This innovative design primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, try to inoculate the system to prevent similar attacks using recognisable signature patterns and this will enhance National Security and prevent unwarranted cyber-attacks on organizations and important National resources
利用国家安全的智能检测和监控系统(IDMS)的创新框架设计
入侵监控是监视网络或设备上不需要的流量的行为,分析它们是否有可能发生事件的迹象,这些事件是违反或迫在眉睫的威胁,违反计算机安全政策,可接受的使用政策或标准安全实践。入侵检测是检测计算机系统或网络中可能发生的危害或事件的过程。IDMS可以是一个已安装的软件或物理智能设备,用于监视网络流量,以检测和防止不需要的活动和事件,例如非法和恶意流量、违反安全策略的流量和违反可接受使用策略的流量。这种创新的设计主要侧重于识别可能的事件,记录有关事件的信息,尝试阻止事件,并向安全管理员报告这些事件。此外,尝试接种系统以防止使用可识别的签名模式的类似攻击,这将增强国家安全,并防止对组织和重要国家资源的无端网络攻击
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信