The fusion method of the IDS and IPS based on IMS

L Leng, L Wang - 2012 International Conference on Computer …, 2012 - ieeexplore.ieee.org
… To pick holes in network and identify the sty Ie of intrusion action or the risk faced before
intrusion action. Not only to detect intrusion, but also initiatively block to stop intrusion action …

Intrusion detection system with packet filtering for IP spoofing

C Manusankar, S Karthik… - … on Communication and …, 2010 - ieeexplore.ieee.org
… of the IDS that is necessarily correlated with detecting of and analyzing the security holes
or … The virtual ARP is also used to translate IP addresses in to corresponding Ethernet MAC …

Implementation of multi-thread based intrusion prevention system for IPv6

JD Lim, YH Kim, BH Jung, KY Kim… - 2007 International …, 2007 - ieeexplore.ieee.org
… the de facto standard of the IDS system yet does not support … The introduced IPS in this
paper provides the function which … And the security hole caused by IPv6 nature feature such as …

[PDF][PDF] Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks

K Rozendaal, A Mailewa - International Journal of Computer Applications - researchgate.net
… What sort of attacks does our IDS need to detect? Is it going to be a network-based system
… a security practitioner to better understand the holes in their security framework. With most …

A review on cooperative bait based intrusion detection in MANET

B Mandal, S Sarkar, S Bhattacharya… - … of Industry Interactive …, 2020 - papers.ssrn.com
IPS) is used to extend solution of IDS for identifying attacks. There are two major detection
techniques used to detect … to identify attacks like black hole attack and gray hole attack. It …

HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency

Z Li, Y Gao, Y Chen - Computer Networks, 2010 - Elsevier
… However, we find that some victims of detected SYN flooding are non-existing IPs or some
… p exceeds p B K y + δ , then by the pigeon hole principle at least one X i must exceed B K y + …

[PDF][PDF] Intrusion Detection & Prevention Using Honeypot

R Rajbhar - … Journal of Advanced Research in Computer …, 2018 - pdfs.semanticscholar.org
IDS & IPS within the honeypot withreal time network packet capturing &intrusions detection
along … Thus the loop holes of the network security can be covered with the help of information …

Host-based IDS: A review and open issues of an anomaly detection system in IoT

I Martins, JS Resende, PR Sousa, S Silva… - Future Generation …, 2022 - Elsevier
… Therefore, anomaly detection appears as a prominent solution capable of recognizing
patterns, learning from experience, and detecting abnormal behavior. However, most approaches …

[PDF][PDF] Characterizing network intrusion prevention system

D Stiawan, AH Abdullah… - International Journal of …, 2011 - repository.unsri.ac.id
… We illustrated in Figure 1, comparison IPS and IDS. … , main problem IPS is that can effectively
detect only attack they … organization, which could penetrate find hole of the defense system. …

Intrusion detection and prevention for ZigBee-based home area networks in smart grids

P Jokar, VCM Leung - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
… In [6] we presented an algorithm for detecting spoofing attacks against static IEEE 802.15.4 …
area of intrusion detection, here we introduce an algorithm which not only is able to detect