Network Systems Intrusion: Concept, Detection, Decision, and Prevention

被引:0
|
作者
Pleskonjic, Dragan [1 ]
Omerovic, Sanida [2 ]
Tomazic, Saso [2 ]
机构
[1] Finsoft Ltd, London, England
[2] Univ Ljubljana, Fac Elect Engn, Ljubljana, Slovenia
来源
关键词
agent; artificial intelligence; concept; decision making; detection; intrusion; prevention; sensor; server; system; wireless network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes concepts for intrusion detection processes; building decision making (DM) criteria on the bases of intrusion detection, and prevention based on DM as a last level of protection in computer systems and networks. The second part of the paper discusses a practical implementation for Intrusion Detection and Prevention Systems (IDPS), based on Wireless technology (WIDPS). Basically paper concentrates on the problems/answers of how to differentiate between legal and illegal access, i.e. intrusion and what are the key and root causes of this difference. Two issues are differenced: finding the set of concepts needed for detection and a set of criteria for DM in IDPS. Paper concludes with achieved results and future goals related to automated DM process in wireless technology.
引用
收藏
页码:40 / 49
页数:10
相关论文
共 50 条
  • [21] State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept
    Carcano, Andrea
    Fovino, Igor Nai
    Masera, Marcelo
    Trombetta, Alberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2010, 6027 : 138 - +
  • [22] Intrusion Detection and Prevention Systems: An Updated Review
    Azeez, Nureni Ayofe
    Bada, Taiwo Mayowa
    Misra, Sanjay
    Adewumi, Adewole
    Van der Vyver, Charles
    Ahuja, Ravin
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2019, VOL 1, 2020, 1042 : 683 - 695
  • [23] Resource allocation in network processors for network intrusion prevention systems
    Lin, Yi-Neng
    Chang, Yao-Chung
    Lin, Ying-Dar
    Lai, Yuan-Chen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1030 - 1036
  • [24] Weaknesses and Strengths Analysis over Network-based Intrusion Detection and Prevention Systems
    Guillen, Edward
    Padilla, Daniel
    Colorado, Yudy
    2009 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2009), 2009, : 181 - 185
  • [25] Vulnerability assessment of android instant messaging application and network intrusion detection prevention systems
    Gaharwar, Ratan Singh
    Gupta, Roopam
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2020, 23 (02): : 399 - 406
  • [26] Research on Data Pollution Prevention in Network Intrusion Detection Systems Based on Naive Bayes
    Lu, Yinglun
    Xie, Tian
    Shen, Jiyue
    Xu, Sheng
    Sun, Pan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 114 - 118
  • [27] TCP reassembler for layer7-aware network intrusion detection/prevention systems
    Hanaoka, Miyuki
    Shimamura, Makoto
    Kono, Kenji
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2007, E90D (12) : 2019 - 2032
  • [28] Application of wavelets and self-similarity to enterprise network intrusion detection and prevention systems
    Akujuobi, C. M.
    Ampah, N. K.
    Sadiku, Matthew N. O.
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 269 - 274
  • [29] Towards Cyber Defense: Research in Intrusion Detection and Intrusion Prevention Systems
    Faysel, Mohammad A.
    Haque, Syed S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 316 - 325
  • [30] An Additive Decision Rules Classifier for Network Intrusion Detection
    Pani, Tommaso
    de Toro, Francisco
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, IWANN 2011, PT I, 2011, 6691 : 105 - 112