Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Anantharaj, B.
- A Survey on Intrusion Detection System: State of the Art Review
Abstract Views :191 |
PDF Views:0
Authors
J. Amudhavel
1,
V. Brindha
1,
B. Anantharaj
2,
P. Karthikeyan
1,
B. Bhuvaneswari
3,
M. Vasanthi
1,
D. Nivetha
1,
D. Vinodha
4
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, TCET, Vandavasi - 627425, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
4 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu
1 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, IN
2 Department of CSE, TCET, Vandavasi - 627425, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, IN
4 Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu
Source
Indian Journal of Science and Technology, Vol 9, No 11 (2016), Pagination:Abstract
Background/Objectives: To analyze and monitoring the activity of nodes using an IDS Intrusion Detection System which provide security to the system. Findings: In this research, a network building was made with simple node formation with a fitting technique. So that it is easy for a user or beginner to understand the asymptotic dominion factors, due to the wide growth of nodes on network. Intrusion detection system is made of several nodes. These nodes are grouped and combined as a network. Since each node in a network has unique characteristics they may have high chance of attack from malware during the communication between systems. Applications/Improvements: Network of topology is done by creating and connecting various sub networks. Sub networks traffic is cleared and monitored with the package of IDS. It works on synchronous message transfer mode which provides acknowledgement to sender and receiver. All sub networks is managed by its corresponding system and further provide update to the master node on the network. Due to this broadcast of messages all other nodes may be in safe state of avoidance from attacker.Keywords
Ad-Hoc Network, Conversation Exchange Dynamics, Intrusion Detection System, Intrusion Prevention System, Network Security- An Empirical Analysis on Quality of Service (QoS) in Cloud Computing
Abstract Views :140 |
PDF Views:0
Authors
J. Amudhavel
1,
R. Vigneshwaran
1,
A. Janakiram
1,
S. Jarina
1,
K. Prem Kumar
1,
B. Anantharaj
2,
D. Sathian
3
Affiliations
1 Department of CSE, SMVEC, Pondicherry - 605107, IN
2 Department of CSE, TCET, Vandavasi - 604505, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, IN
1 Department of CSE, SMVEC, Pondicherry - 605107, IN
2 Department of CSE, TCET, Vandavasi - 604505, Tamil Nadu, IN
3 Department of CSE, Pondicherry University, Pondicherry - 605014, IN