|
|
|
|
|
|
Evaluating the Need for Multiple Intrusion Detection System Priya N.*, Vasantha S.** *Department of Computing, Coimbatore Institute of Technology, Coimbatore, India **Department of Physics, Coimbatore Institute of Technology, Coimbatore, India Online published on 5 April, 2016. Abstract Threat detection remains an essential component of any organization's security posture. As the migration of many organizational services from individual resources to cluster based resources is becoming prevalent, there exists a strong adherence for organizations to secure their respective services from any vulnerable attacks that arise in the cluster environment. One mechanism to achieve a secure cluster environment for the hosted services is to implement a system which detects the intrusions arising over the network. Intrusion detection involves obtaining necessary information about the attacks coming in over the network and determines the individual or the source which cause the respective attack to access the end systems. Though the installed intrusion detection system efficiently logs or captures most of the known attacks, some unknown attacks evade protection layer and cause abnormalities to the normal functioning of the hosted services. In this paper several intrusion detection techniques are evaluated and need for multiple intrusion detection systems is emphasized. Through experimental verification on Defence Advanced Research Projects Agency (DARPA) data set, the individual intrusion detection system's attack detecting capability is found and the results are analysed. Top Keywords Intrusion Detection, Signature, Anomaly, DARPA, Network traffic. Top | |
|
|
|
|
║ Site map
║
Privacy Policy ║ Copyright ║ Terms & Conditions ║
║
|
|
815,568,348 visitor(s) since 30th May, 2005.
|
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
|
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.
|