首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
  • 本地全文:下载
  • 作者:S.MURUGAN ; DR.K.KUPPUSAMY
  • 期刊名称:Indian Journal of Computer Science and Engineering
  • 印刷版ISSN:2231-3850
  • 电子版ISSN:0976-5166
  • 出版年度:2010
  • 卷号:1
  • 期号:4
  • 页码:372-381
  • 出版社:Engg Journals Publications
  • 摘要:This paper is deliberate to provide a model for �Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method � , It describes the state�s overall requirements regarding the acquisition and implementation of intrusion prevention and detection systems with intelligence (IIPS/IIDS). This is designed to provide a deeper understanding of intrusion prevention and detection principles with intelligence may be responsible for acquiring, implementing or monitoring such systems in understanding the technology and strategies available. With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous and spontaneous. Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID,Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security. Intelligence Intrusion Prevention Systems (IIPS) are designed to aid in preventing the compromise of information systems and thus help preserve the basic triad of all security, confidentiality, Integrity and availability (CIA), not only of information but the infrastructures that store and transmit it as well. Intelligence Intrusion detection systems (IDS) refer to any technology or strategy that allows us to detect the attempted compromise of our systems and information, and as before, preserve the CIA of the information and infrastructures. In many cases these two systems work together and with the networking infrastructure to do their jobs. As IIPS/IIDS technology has improved over the last few years, prevention and detection have been consolidated into one network device, or as it is commonly referred to, one �appliance.� In other cases the IPS is a separate technology, usually a software package or �agent� that runs on a desktop or host to detect attempted compromise.
  • 关键词:IIDPS using OODA; Intelligence Intrusion Detection Prevention ; Unknown Malware attack Prevention by using OODA.
国家哲学社会科学文献中心版权所有