International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 8 - Issue 11 |
Published: October 2010 |
Authors: Dr. S.G. Bhirud, Vijay Katkar |
![]() |
Dr. S.G. Bhirud, Vijay Katkar . Article:Novel Architecture for Intrusion-Tolerant Distributed Intrusion Detection System using Packet Filter Firewall and State Transition Tables. International Journal of Computer Applications. 8, 11 (October 2010), 29-32. DOI=10.5120/1248-1631
@article{ 10.5120/1248-1631, author = { Dr. S.G. Bhirud,Vijay Katkar }, title = { Article:Novel Architecture for Intrusion-Tolerant Distributed Intrusion Detection System using Packet Filter Firewall and State Transition Tables }, journal = { International Journal of Computer Applications }, year = { 2010 }, volume = { 8 }, number = { 11 }, pages = { 29-32 }, doi = { 10.5120/1248-1631 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2010 %A Dr. S.G. Bhirud %A Vijay Katkar %T Article:Novel Architecture for Intrusion-Tolerant Distributed Intrusion Detection System using Packet Filter Firewall and State Transition Tables%T %J International Journal of Computer Applications %V 8 %N 11 %P 29-32 %R 10.5120/1248-1631 %I Foundation of Computer Science (FCS), NY, USA
Tremendous efforts have been taken over many years to secure the network against attacks; still attackers are successful with painful frequency. Experienced attackers try to disable the Intrusion Detection System (IDS) before launching attack. Therefore there should be some mechanism in IDS for uninterrupted detection of intrusion even though failure in IDS has occurred due to attacks. This paper presents the design and implementation of Novel Intrusion-Tolerant Distributed Intrusion Detection System using Packet Filter Firewall and State Transition Tables. Proposed architecture is immune to both, failure of IDS components and compromised IDS components. This architecture is capable of restricting the effect of network attacks like DoS, DDoS and Probing to a subset of network. Experimental results prove the usefulness and efficiency of this architecture.