Eidps: An efficient approach to protect the network and intrusion prevention

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Nowadays, Network Security is growing rapidly because no user specifically wants his/her computer system to be intruded by a malicious user or an attacker. The growing usage of cloud computing provides a different type of services, which leads users to face security issues. There are different types of security issues such as hacking intrusions worms and viruses, DoS etc. Since the entire needed resources are associated with everyone and are centrally monitored by main controller in cloud computing area it creates a simplest way for intruders. In addition, an experienced or knowledgeable attacker can get to make out the system’s weakness and can hack the sensible information or any resource and so, it is essential to provide protection against attack or intrusion. Additionally, to handle poor performance or low latency for the clients, filtering malicious accesses becomes the main concern of an administrator. Some of the traditional Intrusion Detection and Prevention Systems fail to overcome the abovementioned problems. As a result, this research proposes a novel approach named Enhanced Intrusion Detection Prevention System to prevent, protect and respond the various network intrusions in the internet. Our proposed system use client-server architecture, which contains main server and several clients. Clients record the doubtful actions taking place in the Internet and record the suspicious information. Then, this recorded information is forwarded to the main server for further usage. After that, the main server analyses the received data and then make decision whether to provide a security alert or not; then the received information is displayed via an interface.

Cite

CITATION STYLE

APA

Selvaraj, R., Kuthadi, V. M., & Marwala, T. (2016). Eidps: An efficient approach to protect the network and intrusion prevention. In Advances in Intelligent Systems and Computing (Vol. 434, pp. 35–47). Springer Verlag. https://doi.org/10.1007/978-81-322-2752-6_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free