A New Parallel Hybrid Model - Intrusion Prevention Systems

In recent days it becomes very difficult task to manage security on large network and practically not possible to keep security scanner on every networks for protecting the system from illegal users. This problem can be solved with prevention systems which come in strategic role of Intrusion Prevention Systems that is taken as extended and enhanced version of IDS. By using this system we can upgrade the security and it can make the latest network security brand hybrid model for achieving the new level of security system. As IPS is constructed and configure dynamically, then it can be design and installed with any hardware and user friendly platform. In this newly designed system lots of activity is to be handle like screening, blocking and terminating the connected line just before the host port. In our propose system IPS(PH-IPS) is constructed with multilevel checking in which every input is passing through the multilevel check post which is deployed before firewall and minimizing the maximum risk of firewall of the personal networks. After qualifying the test which is allocated by classifier via controller and allocation module only requested object will be allotted token to enter into the personal network for achieving their work execution.

[1]  Vallipuram Muthukkumarasamy,et al.  Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[2]  Massudi Mahmuddin,et al.  An Overview of Flow-Based and Packet-Based Intrusion Detection Performance in High Speed Networks , 2011 .

[3]  Bruno Dutertre,et al.  Intrusion-tolerant Enclaves , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  Y. Weinsberg,et al.  High performance string matching algorithm for a network intrusion prevention system (NIPS) , 2006, 2006 Workshop on High Performance Switching and Routing.

[5]  Christian Fraboul,et al.  A holistic methodology for evaluating wireless Intrusion Detection Systems , 2011, 2011 5th International Conference on Network and System Security.

[6]  Huang Chuanhe,et al.  Anomaly detection using Support Vector Machine classification with k-Medoids clustering , 2012, 2012 Third Asian Himalayas International Conference on Internet.

[7]  Li Xue-yong,et al.  A New Intrusion Detection Method Based on Improved DBSCAN , 2010, 2010 WASE International Conference on Information Engineering.

[8]  Ali A. Ghorbani,et al.  Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[9]  Meng Jianliang,et al.  The Application on Intrusion Detection Based on K-means Cluster Algorithm , 2009, 2009 International Forum on Information Technology and Applications.

[10]  Lei Li,et al.  A novel rule-based Intrusion Detection System using data mining , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[11]  Aiko Pras,et al.  An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.

[12]  Yongzhong Li,et al.  Anomaly Intrusion Detection Method Based on K-Means Clustering Algorithm with Particle Swarm Optimization , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.

[13]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[14]  Wang Qian,et al.  A graph-based clustering algorithm for anomaly intrusion detection , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[15]  Nur Izura Udzir,et al.  Intrusion detection based on k-means clustering and OneR classification , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[16]  Ravi Ranjan,et al.  A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.

[17]  K. Wankhade,et al.  An Overview of Intrusion Detection Based on Data Mining Techniques , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[18]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[19]  Michael J. Chapple,et al.  Flow Anomaly Detection in Firewalled Networks , 2006, 2006 Securecomm and Workshops.