Open Access   Article Go Back

A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure

R.Elamaran 1 , R.Mala 2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-11 , Page no. 159-164, Nov-2015

Online published on Nov 30, 2015

Copyright © R.Elamaran , R.Mala . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.Elamaran , R.Mala, “A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.159-164, 2015.

MLA Style Citation: R.Elamaran , R.Mala "A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure." International Journal of Computer Sciences and Engineering 3.11 (2015): 159-164.

APA Style Citation: R.Elamaran , R.Mala, (2015). A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure. International Journal of Computer Sciences and Engineering, 3(11), 159-164.

BibTex Style Citation:
@article{_2015,
author = {R.Elamaran , R.Mala},
title = {A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2015},
volume = {3},
Issue = {11},
month = {11},
year = {2015},
issn = {2347-2693},
pages = {159-164},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=754},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=754
TI - A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure
T2 - International Journal of Computer Sciences and Engineering
AU - R.Elamaran , R.Mala
PY - 2015
DA - 2015/11/30
PB - IJCSE, Indore, INDIA
SP - 159-164
IS - 11
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2248 2191 downloads 2263 downloads
  
  
           

Abstract

Intrusion detection system (IDS) has been utilized as a vital instrument in defending the Framework from this pernicious or typical activity. it is still desirable to know what interruptions have happened or are happening, so that we can understand the security dangers and dangers and consequently be better arranged for future assaults With the capacity to analyze Framework movement and perceive incoming and ongoing Framework attack, majority of Framework administrator has turn to IDS to help them in recognizing inconsistencies in Framework movement In this paper, we focus on diverse sorts of assaults on IDS this paper gives a depiction of diverse assault on diverse convention such as TCP ,UDP,ARP and ICMP.

Key-Words / Index Term

Attack, DoS, Interruption Identification , NIDS, Protocols.

References

[1] KrishnaKumar, B. ; Dept. of Electron. & Commun. Eng., PET Eng. Coll., Thirunelvelli, India ; Kumar, P.K. ; Sukanesh, R. "Hop Count Based Packet Processing Approach to Counter DDoS Attacks" Published in: Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on Date of Conference: 12-13 March 2010 Page(s): 271 - 273.
[2] Yu-Chung Huang ; Dept. of Comput. Sci. & Inf. Eng., Nat. Central Univ., Jhongli, Taiwan ; Jehn-Ruey Jiang " Efficient Ultralightweight RFID Mutual Authentication" Published in: Internet of Things (iThings), 2014 IEEE International Conference on, and Green Computing and Communications (GreenCom), IEEE and Cyber, Physical and Social Computing(CPSCom), IEEE Date of Conference: 1-3 Sept. 2014 Page(s): 102 - 108.
[3] Liu, Sisi ; University of Arizona, Tucson ; Lazos, Loukas ; Krunz, Marwan "Thwarting Control-Channel Jamming Attacks from Inside Jammers" Published in: Mobile Computing, IEEE Transactions on (Volume:11 , Issue: 9 ) Date of Publication : 04 August 2011 Page(s): 1545 - 1558.
[4] Zhao Wang ; Key Lab. of High Confidence Software Technol., MoE, Beijing, China ; Xuesong Zhang ; Zhong Chen "Rapdos: A RFID Authentication Protocol for Defending against DoS" Published in: Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on Date of Conference: 17-19 Aug. 2012 Page(s): 1042 - 1045.
[5] Hung-Yu Chien ; Dept. of Inf. Manage., Nat. Chi Nan Univ., Puli "DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols" Published in: Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE Date of Conference: 9-12 Dec. 2008 Page(s): 615 - 622.
[6] Gianluigi Me ; Dipt. di Informatica, Sistemi e Produzione, Rome Univ., Italy "Exploiting buffer overflows over Bluetooth: the BluePass tool" Published in: Wireless and Optical Communications Networks, 2005. WOCN 2005. Second IFIP International Conference on Date of Conference: 6-8 March 2005 Page(s): 66 - 70.
[7] Hung-Yu Chien ; Dept. of Inf. Manage., Nat. Chi Nan Univ., Puli "Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance" Published in: Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE Date of Conference: 9-12 Dec. 2008 Page(s): 607 - 614.
[8] Jyothi, Vinayaka ; ECE Department, NYU Polytechnic School of Engineering, Brooklyn, New York, USA ; Addepalli, Sateesh K. ; Karri, Ramesh "Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems" Published in: Computer Design (ICCD), 2015 33rd IEEE International Conference on Date of Conference: 18-21 Oct. 2015 Page(s): 266 - 272.
[9] Mikki, M. ; Comput. Eng. Dept., Islamic Univ. of Gaza, Gaza, Palestinian Authority ; Mansour, Y.M. ; Kangbin Yim "Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks" Published in: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on Date of Conference: 3-5 July 2013 Page(s): 188 - 195.
[10] Conti, Mauro ; Dipartimento di Inf., Univ. di Roma La Sapienza, Rome ; Pietro, Roberto Di ; Mancini, Luigi Vincenzo ; Spognardi, Angelo "RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy" Published in: Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on Date of Conference: 19-23 March 2007 Page(s): 229 - 234.
[11] Chin-Chen Chang ; Dept. Inf. Eng. & Comput. Sci., Feng Chia Univ. Taichung, Taichung, Taiwan ; Wei-Yi Chen ; Ting-Fang Cheng "A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard" Published in: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on Date of Conference: 27-29 Aug. 2014 Page(s): 642 - 645.
[12] Kara, A. ; Dept. of Comput. Sci. & Eng., Aizu Univ., Fukushima, Japan ; Suzuki, T. ; Takahashi, K. ; Yoshikawa, M. "A DoS-vulnerability analysis of L2TP-VPN" Published in: Computer and Information Technology, 2004. CIT '04. The Fourth International Conference on Date of Conference: 14-16 Sept. 2004 Page(s): 397 - 402.
[13] Mobahat, H. ; LuLea Univ. of Technol., Lulea, Sweden "Authentication and lightweight cryptography in low cost RFID" Published in: Software Technology and Engineering (ICSTE), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 3-5 Oct. 2010 Page(s): V2-123 - V2-129.
[14] Onen, M. ; Instn. Eurecom, Sophia-Antipolis, France ; Molva, R. "Denial of service prevention in satellite networks" Published in: Communications, 2004 IEEE International Conference on (Volume:7 ) Date of Conference: 20-24 June 2004 Page(s): 4387 - 4391 Vol.7.
[15] Zavvari, A. ; Dept. of Electr. Electron. & Syst. Eng., Univ. Kebangsaan Malaysia, Bangi, Malaysia ; Islam, M.T. ; Shakiba, M. ; Mandeep, S.J. "Theoretical analysis of RFID security protocols" Published in: Industrial Engineering and Engineering Management (IEEM), 2014 IEEE International Conference on Date of Conference: 9-12 Dec. 2014 Page(s): 302 - 306.
[16] Sajjadi Jahromi, S.H. ; Neyriz Branch, Islamic Azad Univ., Neyriz, Iran ; Mehraban Jahromi, M.H. "Optimization of User Identification Scheme with Preserving User Anonymity" Published in: Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on Date of Conference: 10-12 Sept. 2010 Page(s): 462 - 466.
[17] Bin Wang ; Sch. of Electr. & Electron. Eng., Nanyang Technol. Univ., Singapore, Singapore ; Maode Ma "A Server Independent Authentication Scheme for RFID Systems" Published in: Industrial Informatics, IEEE Transactions on (Volume:8 , Issue: 3 ) Date of Publication : 26 January 2012 Page(s): 689 - 696.
[18] Jia-Ning Luo ; Inf. & Telecommun., Ming Chuan Univ., Taoyuan, Taiwan ; Ming-Hour Yang "An efficient delegation protocol in mobile RFID networks" Published in: Information Security and Intelligence Control (ISIC), 2012 International Conference on Date of Conference: 14-16 Aug. 2012 Page(s): 160 - 163.
[19] Hung-Yu Chien ; Dept. of Inf. Manage., Nat. Chi-Nan Univ., Nantou, Taiwan ; Chin-I Lee ; Shyr-Kuen Chen ; Hung-Pin Hou "New RFID Authentication Protocol with DOS-attack Resistance" Published in: Parallel and Distributed Systems (ICPADS), 2011 IEEE 17th International Conference on Date of Conference: 7-9 Dec. 2011 Page(s): 605 - 609.
[20] Abughazalah, S. ; Smart Card Centre-Inf. Security Group (SCC-ISG), Univ. of London, Egham, UK ; Markantonakis, K. ; Mayes, K. "A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA" Published in: Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for Date of Conference: 9-12 Dec. 2013 Page(s): 44 - 51.