Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of IDS and IIDPS

S Murugan, K. Kuppusamy

Abstract


This paper prominences on comparision analysis of IDS(Intrusion Detection) and IIDPS(Intelligence Intrusion Detection Prevention Systems). It makes the state’s overall requirements regarding the acquisition of unknown malware with the help of mathematical scheme and few model with newly designed algorithm. This is envisioned to provide a deeper understanding of existing intrusion detection principles with intelligence strategies, that will be responsible for acquiring unknown malware. It associate the false positive rate and false negative rate. That will be demonstrated by conducted different experiments with simulation.

KEYWORDS: Intelligence Intrusion Multi Detection Prevention System, IIMDPS, Unknown Malware, Intelligence Intrusion Multi Detection Prevention Systems, Intelligence Intrusion Detection Prevention System, IIDPS.

Full Text:

PDF

References


Chebrolu S, Abraham A, Thomas JP, “Feature detection and ensemble design of intrusion detection systems”, Compute Security; 24:, 2005, pp.295–307.

Chen Y, Abraham A, Yang J , “Feature deduction and intrusion detection using flexible neural trees”, In Second IEEE International Symposium on Neural Networks , 2005.

Chou T-S, Yen KK, “Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks”, The 2007 IEEE workshop on information assurance, United States MilitaryAcademy, West Point, NY, pp 207–213.

Cohen F, ”Computer viruses: theory and experiments”, Computer Security 6(1):22–35,1987.

Ghosh AK, Schwartzbard A, Schatz M , “Learning program behavior profiles for intrusion detection”, Workshop on intrusion detection and network monitoring, Santa Clara, CA, USENIX,1999.

Livadas C, Walsh B, Lapsley D, Strayer T , “Using machine learning techniques to identify botnet traffic”, Second IEEE LCN workshop on network security (WNS), Tampa, FL, USA,2006.




DOI: https://doi.org/10.37628/ijacs.v1i2.116

Refbacks

  • There are currently no refbacks.