Title of article :
Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
Author/Authors :
S.MURUGAN MCA.، نويسنده , , MPHIL.، نويسنده , , CGT.، نويسنده , , MISTE.، نويسنده , , (MS).، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Pages :
10
From page :
372
To page :
381
Abstract :
This paper is deliberate to provide a model for “Intelligence Intrusion Detection Prevention Systems using ObjectOriented Analysis method ” , It describes the state’s overall requirements regarding the acquisition and implementation ofintrusion prevention and detection systems with intelligence (IIPS/IIDS). This is designed to provide a deeper understanding ofintrusion prevention and detection principles with intelligence may be responsible for acquiring, implementing or monitoringsuch systems in understanding the technology and strategies available. With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous andspontaneous management will be a key feature of future networks and information systems. In this context, security is anessential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous andspontaneous. Future networks and systems must be able to automatically configure themselves with respect to their securitypolicies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks andsystems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They mustbe able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant responsewhen a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial toaddress this issue in different wireless and mobile technologies available today such as RFID,Wifi, Wimax, 3G, etc. Othertechnologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for anautonomous and spontaneous management of security. Intelligence Intrusion Prevention Systems (IIPS) are designed to aid in preventing the compromise of informationsystems and thus help preserve the basic triad of all security, confidentiality, Integrity and availability (CIA), not only ofinformation but the infrastructures that store and transmit it as well. Intelligence Intrusion detection systems (IDS) refer to any technology or strategy that allows us to detect the attemptedcompromise of our systems and information, and as before, preserve the CIA of the information and infrastructuresIn many cases these two systems work together and with the networking infrastructure to do their jobs. As IIPS/IIDStechnology has improved over the last few years, prevention and detection have been consolidated into one network device, or asit is commonly referred to, one “appliance.” In other cases the IPS is a separate technology, usually a software package or “agent” that runs on a desktop or host to detect attempted compromise
Keywords :
IIDPS using OODA , Intelligence Intrusion Detection Prevention , Unknown Malware attack Prevention by using OODA
Journal title :
Indian Journal of Computer Science and Engineering
Serial Year :
2010
Journal title :
Indian Journal of Computer Science and Engineering
Record number :
667462
Link To Document :
بازگشت