NIDS:基于网络的入侵检测和防御方法

Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan
{"title":"NIDS:基于网络的入侵检测和防御方法","authors":"Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan","doi":"10.1109/IACSIT-SC.2009.96","DOIUrl":null,"url":null,"abstract":"Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. The host based systems as well as the network based systems have their own limitations. So, the quest for betterment continues. In this progression, here we present NIDS: a complete intrusion detection system which reduces some significant problems contained by the previous systems such as trust issues and message spreading problems. In the proposed IDS we don’t need to install the system for every host. That reduces the system overhead to a reasonable extent. This system generates steady responses against intrusions and stops the intruder to proceed for further attacks.","PeriodicalId":286158,"journal":{"name":"2009 International Association of Computer Science and Information Technology - Spring Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"NIDS: A Network Based Approach to Intrusion Detection and Prevention\",\"authors\":\"Martuza Ahmed, R. Pal, M. Hossain, Md. Abu Naser Bikas, Md. Khalad Hasan\",\"doi\":\"10.1109/IACSIT-SC.2009.96\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. The host based systems as well as the network based systems have their own limitations. So, the quest for betterment continues. In this progression, here we present NIDS: a complete intrusion detection system which reduces some significant problems contained by the previous systems such as trust issues and message spreading problems. In the proposed IDS we don’t need to install the system for every host. That reduces the system overhead to a reasonable extent. This system generates steady responses against intrusions and stops the intruder to proceed for further attacks.\",\"PeriodicalId\":286158,\"journal\":{\"name\":\"2009 International Association of Computer Science and Information Technology - Spring Conference\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Association of Computer Science and Information Technology - Spring Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IACSIT-SC.2009.96\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Association of Computer Science and Information Technology - Spring Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IACSIT-SC.2009.96","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

摘要

计算机网络为全球通信增加了新的维度。但是,网络上安全的数据通信一直受到入侵和滥用的威胁。因此,网络安全成为一个问题。当今入侵检测系统在安全基础设施中扮演着重要的角色。入侵通常始于入侵者通过易受攻击的主机渗透到网络中,然后进行进一步的恶意攻击。用于入侵检测的技术有其特定的局限性。目前提出的任何入侵检测系统都不是完全完美的。基于主机的系统和基于网络的系统都有各自的局限性。因此,对改善的追求仍在继续。在这个过程中,我们提出了NIDS:一个完整的入侵检测系统,它减少了以前系统中包含的一些重要问题,如信任问题和消息传播问题。在建议的IDS中,我们不需要为每个主机安装系统。这在一定程度上减少了系统开销。这个系统对入侵产生稳定的反应,并阻止入侵者继续进行进一步的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
NIDS: A Network Based Approach to Intrusion Detection and Prevention
Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host and after that approaching for further malicious attacks. The techniques used for intrusion detection have their particular limitations. Any of the Intrusion Detection Systems proposed so far is not completely flawless. The host based systems as well as the network based systems have their own limitations. So, the quest for betterment continues. In this progression, here we present NIDS: a complete intrusion detection system which reduces some significant problems contained by the previous systems such as trust issues and message spreading problems. In the proposed IDS we don’t need to install the system for every host. That reduces the system overhead to a reasonable extent. This system generates steady responses against intrusions and stops the intruder to proceed for further attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信