CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Model of an effective Intrusion Detection System on the LAN

by Yousef Farhaoui, Ahmed Asimi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 11
Year of Publication: 2012
Authors: Yousef Farhaoui, Ahmed Asimi
10.5120/5586-7830

Yousef Farhaoui, Ahmed Asimi . Model of an effective Intrusion Detection System on the LAN. International Journal of Computer Applications. 41, 11 ( March 2012), 26-29. DOI=10.5120/5586-7830

@article{ 10.5120/5586-7830,
author = { Yousef Farhaoui, Ahmed Asimi },
title = { Model of an effective Intrusion Detection System on the LAN },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 11 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number11/5586-7830/ },
doi = { 10.5120/5586-7830 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:29:19.886877+05:30
%A Yousef Farhaoui
%A Ahmed Asimi
%T Model of an effective Intrusion Detection System on the LAN
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 11
%P 26-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge, and works in this research are becoming more numerous. Various tools and mechanisms are developed to ensure a level of security to meet the demands of modern life. Among the systems, intrusion detection for identifying abnormal behavior or suspicious activities to undermine the legitimate operation of the system. The objective of this paper is the design and implementation of a comprehensive architecture of IDS in a network.

References
  1. Y. Fargaoui, A. Asimi, "Performance method of assessment of the intrusion detection and prevention systems," IJ E ST , Vol. 3 No. 7 July 2011
  2. Y. Farhaoui, A. Asimi, «Performance Assessment of the intrusion Detection and Prevention Systems: According to their features: the method of analysis, reliability, reactivity, facility, adaptability and performance», The 6th IEEE international conference Sciences of Electronics Technologies Information and Telecommunication (SETIT 2011), Sousse, Tunisia, 2011.
  3. Y. Fargaoui, A. Asimi, "Performance Assessment of tools of the intrusion Detection and Prevention Systems," IJCSIS , Vol. 10 No. 1 January 2012
  4. MIT Lincoln Laboratory, DARPA Intrusion Detection Evaluation Data Sets, www. ll. mit. edu/IST
  5. K. Boudaoud, "Un systeme multi_agents pour la détection d'intrution » Institution EURECOM Sophia-Antipolis.
  6. J. Hochberyn K. Jackson, C Stallings, J. F Mclary, D. Dubois, J. Ford, NADIR "An automated system for detection network intrusion and misuse" , Cpmputers and Security.
  7. The UCIKDD archive, Information and Comuter Science, university of california.
Index Terms

Computer Science
Information Sciences

Keywords

Ids Architecture Model