Analysis and Design Modeling for Next Generation Network Intrusion Protection Systems
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 7 Issue 3, March 2018

Analysis and Design Modeling for Next Generation Network Intrusion Protection Systems

Nareshkumar Harale, B. B. Meshram

the continued exponential growth of successful cyber intrusions against todays businesses has made it abundantly clear that traditional perimeter security measures are no longer effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: Intrusion System, Network Intrusion Detection, Intrusion Prevention, Firewall system, Data Mining, Association rule, Network Security

Edition: Volume 7 Issue 3, March 2018

Pages: 651 - 658

Share this Article

How to Cite this Article?

Nareshkumar Harale, B. B. Meshram, "Analysis and Design Modeling for Next Generation Network Intrusion Protection Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=11031803, Volume 7 Issue 3, March 2018, 651 - 658

65 PDF Views | 57 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Network Intrusion Detection'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2662 - 2666

Host Based Network Intrusion Detection System in Virtual Machine

Rupali Pravin Adhau, Saba Siraj

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 1149 - 1157

A Hybrid Approach for Intrusion Detection System

Hussam A. Al-Ameen

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2373 - 2377

A Review of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Trupti Dange, Pankaj Bhalerao

Share this Article

Similar Articles with Keyword 'Intrusion Prevention'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1747 - 1751

Identification and Avoidance of DDoS Attack for Secured Data Communicationin Cloud

Aaqib Iqbal Wani, Janaki Raman V., N. Priya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1966 - 1971

Comparative Analysis of Hybrid Intrusion Detection System and Intrusion Prevention System for MANET

Pallavi P Puri, Nitin R. Chopde

Share this Article

Research Paper, Computer Science & Engineering, Sudan, Volume 6 Issue 9, September 2017

Pages: 337 - 342

Intrusion Detection System Using Weka Data Mining Tool

Asma Abbas Hassan, Alaa F. Sheta, Talaat M. Wahbi

Share this Article

Similar Articles with Keyword 'Firewall system'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 3, March 2018

Pages: 651 - 658

Analysis and Design Modeling for Next Generation Network Intrusion Protection Systems

Nareshkumar Harale, B. B. Meshram

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 3, March 2018

Pages: 629 - 642

FireMAN: Next Generation Firewall Systems Design using Data Mining

Nareshkumar D. Harale, Dr. B. B. Meshram

Share this Article

Similar Articles with Keyword 'Data Mining'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 473 - 475

Data Mining for Sales Prediction in the Tourism Industry

Pratiksha Jain, N. Partheeban, Rajkumar R.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1102 - 1105

Subgroup Discovery a Data Mining Technique: Immense Survey

Deepali Nidhan Gunjate, B. R. Kanawade

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1304 - 1307

A Survey Paper on Mining Keywords Using Text Summarization Extraction System for Summary Generation over Multiple Documents

Parmar Paresh B., Ketan Patel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 496 - 497

Naive Buyers Theorem for Heart Disease Prediction System

Indu Kumari, Dinesh Kumar Bahgel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1358 - 1366

Quality Prediction of Red Wine based on Different Feature Sets Using Machine Learning Techniques

Nikita Sharma

Share this Article

Similar Articles with Keyword 'Association rule'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2015 - 2017

Frequent Pattern Growth to Mine Infrequent Weighted Item-Set

Vaidya Seema Bhagwan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1227 - 1231

An Efficient Clustering Based High Utility Infrequent Weighted Item Set Mining Approach

Dr. N. Umadevi, A. Gokila Devi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 621 - 623

A Survey: By Using Frequent Pattern Growth Infrequent Weighted Itemset Mining

Vaidya Seema Bhagwan, A. B. Bagwan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1498 - 1500

Building Fuzzy Associative Classifier Using Fuzzy Values

P. Kayal, S. Kannan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1990 - 1992

Techniques of OLAP and Association Rule Mining

Gunwanti R. Bawane, Prarthana Deshkar

Share this Article

Similar Articles with Keyword 'Network Security'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 690 - 695

Active Watermarking Approach in Detecting Encrypted Traffic Attack by Making Correlation Scheme Robust

Saptshree Dengle, Dr. Santosh Lomte

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article
Top