Science Park
ISSN : 2321–8045
Impact Factor : 3.4218[UIF-2017]
Archived Articles : Volume: I Issue: XXXIX, 17 April 2014
75
'INTRUSION DETECTION SYSTEM' An Approach for Finding Attacks
Ashutosh Kumar and Mayank Kumar Mittra
Abstract
pdfePubcertificateEndNoteBibTexRefManagerMobile Full TextAuthor Profile
Traditionally firewalls are used to prevent the intruders to make an attack. But they have static configurations that prevent attacks based on source and destination ports and IP addresses. These are not sufficient to provide security from all the attacks. Therefore, we need an IDS system which will identify the all types of attacks and generate an alarm. Proposed IDS is in two phases. In Phase-I, A database is maintained in the server side which contains the authorized IP address of the Local Area Network (LAN).Then a matching between stored and incoming IP will be matched up here. We will find a perfect match,this value depend on the less or higher threshold value. The value will show the infected packets and reported to the admin by an alert message like email. In Phase-II, the proposed concept includes state protocol analysis and packet filtering techniques. At last the proposed IDS can effectively and efficiently detect the attacks that are similar to DOS, U2R, RST and Experimental results are also show that the proposed method can effectively detect the attack that is similar to TCP SYN FLOOD and other attacks.

  • Current Issue is published
  • Next Issue on Next Week
Copyright © 2013 Bridge Center and Laxmi Book Publication.All Rights Reserved