Open Access   Article Go Back

A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS)

S. K. Tiwari1 , D. S. Pandey2 , V. Namdeo3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 204-210, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.204210

Online published on Jul 31, 2018

Copyright © S. K. Tiwari, D. S. Pandey, V. Namdeo . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. K. Tiwari, D. S. Pandey, V. Namdeo, “A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS),” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.204-210, 2018.

MLA Style Citation: S. K. Tiwari, D. S. Pandey, V. Namdeo "A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS)." International Journal of Computer Sciences and Engineering 6.7 (2018): 204-210.

APA Style Citation: S. K. Tiwari, D. S. Pandey, V. Namdeo, (2018). A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS). International Journal of Computer Sciences and Engineering, 6(7), 204-210.

BibTex Style Citation:
@article{Tiwari_2018,
author = {S. K. Tiwari, D. S. Pandey, V. Namdeo},
title = {A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {204-210},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2417},
doi = {https://doi.org/10.26438/ijcse/v6i7.204210}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.204210}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2417
TI - A Real Time Approach to Strengthen Computer Security By Host Cum Network Agent Based Intrusion Detection System (HCN-AIDS)
T2 - International Journal of Computer Sciences and Engineering
AU - S. K. Tiwari, D. S. Pandey, V. Namdeo
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 204-210
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
556 424 downloads 256 downloads
  
  
           

Abstract

To enhance and strengthen the security features of computer`s information. As for as term Computer security is concern; it is the process of collecting information about unauthorized access. Detection is a recognition process which helps us to determine if someone tried to enter the target system successfully or not. Although there are so many methodologies has been also developed to make secure the secret and private information but still there is occurrence of unauthorized access of information takes place and violate the existing meaning, features and functionalities. Such unauthorized users are called as Intruders. These are also called as attackers or crackers. An attacker may not care about our identity and their action effects often try to take control of the computer to launch attacks on the computer systems secretly. In this research work it is focused to develop such a strong intrusion detection system which can silently and efficiently capture the intrusions penetrating in individual host systems or any host of the network system dynamically. This is “A Real Time Approach to Strengthen Computer Security by Host cum Network Agent Based Intrusion Detection System (HCN-AIDS)”which will enhance efficiency as compared to earlier agent based intrusion detection system. It includes powerful agents equipped with strong unique functionalities like Network Agent, Mobile Agent, Intrusion Detection Agent, Rule agent etc. this research model is again becomes more important and useful because works in hybrid mode i.e. in real time data as well host based systems and generates efficient results.

Key-Words / Index Term

Attacks, Crackers, Information, Detection, feature, Host, Intruder, Intrusion, Mobile Agent, Network Agent, security etc.

References

[1] A.M. Riyad, M.S. Irfan Ahmed and R.L. Raheemaa Khan “Multi agent based intrusion detection architecture for the IDS adaptation over time”, Second International Conference on Electrical, Computer and Communication Technologies (ICECCT),IEEE,2017
[2] Mohiyeddin Mozaffari and Behrouz Safarinejadian,”Mobile-agent-based distributed variational Bayesian algorithm for density estimation in sensor networks” IET Science, Measurement & Technology Volume: 11, 2017
[3] Chaimae Saadi ,Ensak-Morroco and Habiba Chaoui “Intrusion detection system based interaction on mobile agents and clust-density algorithm “IDS-AM-Clust”, International Colloquium on Information Science and Technology (CiSt),IEEE,2016
[4] Sara Chadli,Mohamed Emharraf and Mohammed Saber "The design of an IDS architecture for MANET based on multi-agent" International Colloquium on Information Science and Technology (CiSt),IEEE,2014
[5] Okan Can "Mobile agent based intrusion detection system”, 22nd Signal Processing and Communications Applications Conference (SIU), 2014
[6]Wang Yu, Cheng, Xiaohui and Wang Sheng ,“Anomaly Network Detection Model Based on Mobile Agent”, IEEE,Third International Conference on Measuring Technology and Mechatronics Automation, 2011
[7] Ionita, I.; Ionita, L. “An agent-based approach for building an intrusion detection system” Published in Networking in Education and Research, 2013 RoEduNet International Conference 12th Edition, 2013
[8] Jitendra S Rathore, Praneet Saurabh, Bhupendra Verma “AgentOuro: A Novelty Based Intrusion Detection and Prevention System” Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on 3-5 Nov. 2012
[9] Vasima Khan, Anomaly Based Intrusion Detection And Prevention System, IJERT, 2013
[10] Mukesh Sharma,Akhil Kaushik, Amit Sangwan Performance Analysis of Real Time Intrusion Detection and Prevention System using Snort.,IJERT, 2012
[11] Vaishali T.Deshmukh, Shubhangi Vaikole, Layered Crf A Model To Build More Accurate Intrusion Detection System, IJERT, 2012
[12] Bhavana G.Rathwa,Prof.Purnima Singh Genetic Algorithm Methodology for Intrusion Detection System, IJERT, 2012
[13] Bin Zeng , Lu Yao and ZhiChen Chen"A network intrusion detection system with the snooping agents",International Conference on Computer Application and System Modeling, 2010
[14] Cheung-Leung Lui , Tak-Chung Fu and Ting-Yee Cheung "Agent-based network intrusion detection system using data mining approaches”, Third International Conference on Information Technology and Applications (ICITA`05), 2005
[15] Qiang Xue , Lin-Lin Guo and Ji-Zhou Sun"The design of a distributed network intrusion detection system IA-NIDS", Proceedings of the 2003 International Conference on Machine Learning and Cybernetics, 2003
[16] Xiao-Yuan Yang , Xuan-Wu Zhou , Ping Wei and Li-Xian Wei"Hybrid NIDS based on biological immunology", Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 2004
[17] Faizal, M.A., Mohd Zaki M., Shahrin Sahib, Robiah, Y., Siti Rahayu, S., and Asrul Hadi, Y. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010