Research Paper | Computer Science & Engineering | India | Volume 3 Issue 3, March 2014
Ontological IDS Monitoring On Defined Attack
Vinod Kumar Shukla, D. B. Ojha
Internet growth has become the challenge for the internet security. Our paper is divided into four sections. Section I is introduction. Section II is based on the concepts of SNMP, MIB, IDS and Ontology. In subsequent sections there is discussion about our proposed method in which, we have taken a model of manager and agent communication. All agents in one network communicate to one manager. Manager take the responsibility for identifying and defining the new type of Intrusion based on communication done between manager and agent. If intrusion is confirmed then immediately and ontology will be formed by manager and communicated to all managed devices in network with the help of Ontology, it will help all the managed devices on the network to update their intrusion signature database. By this all the devices on the network can be more secure and monitoring will be more updated.
Keywords: SNMP, MIB, IDS, Onotology, OWL-DL
Edition: Volume 3 Issue 3, March 2014
Pages: 665 - 670
How to Cite this Article?
Vinod Kumar Shukla, D. B. Ojha, "Ontological IDS Monitoring On Defined Attack", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131255, Volume 3 Issue 3, March 2014, 665 - 670
103 PDF Views | 81 PDF Downloads
Similar Articles with Keyword 'MIB'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 665 - 670Ontological IDS Monitoring On Defined Attack
Vinod Kumar Shukla, D. B. Ojha
Survey Paper, Computer Science & Engineering, Namibia, Volume 6 Issue 8, August 2017
Pages: 1842 - 1846A Preliminary Framework for the Adoption of Mobile Learning Technology in Namibian High Schools: A Case of the Erongo Region
Osakwe Jude Odiakaosa, Nomusa Dlodlo, Norbert Jere
Similar Articles with Keyword 'IDS'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1317 - 1319A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Chaitanya Sharma
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2085 - 2089Implementation and Analysis of DoS Attack Detection Algorithms
Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2025 - 2030Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System
Hardik M. Shingala, Mukesh Sakle
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2294 - 2298Effective Approach for Localizing Jammers in Wireless Sensor Network
Ashwini S. Chimankar, V. S. Nandedkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Similar Articles with Keyword 'Onotology'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 665 - 670Ontological IDS Monitoring On Defined Attack
Vinod Kumar Shukla, D. B. Ojha
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1292 - 1296Proposed Concept for Ontology Communication between IOT Devices
Vinod Kumar Shukla, Dr. D.B. Ojha
Similar Articles with Keyword 'OWL-DL'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014
Pages: 665 - 670Ontological IDS Monitoring On Defined Attack
Vinod Kumar Shukla, D. B. Ojha
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1292 - 1296Proposed Concept for Ontology Communication between IOT Devices
Vinod Kumar Shukla, Dr. D.B. Ojha