Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 140 | Weekly Hits: ⮙2

Research Paper | Information Technology | Kenya | Volume 7 Issue 3, March 2018

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Around us are Computer networks that necessitate effective communication, sharing of knowledge, research and development, education modernization, e-commerce and entertainment just to mention a few. The present days network systems are increasingly getting exposed to many security threats and vulnerabilities including denial of service (DoS), scanning, password cracking, spoofing, eavesdropping, spamming, phishing, worms among others. These security threats and vulnerabilities have seen organizations and companies implement security policies for their networks. However, most of these security policies only inspect the network traffic passing through them denying or permitting packets passage based on their active set of rules. This ideally leaves the network exposed to attacks from outside and within. This paper presents technical evaluation methods for network security at the IP layer. This will be done through experiments on network traffic data. This will involve Network analyzers for collecting data from 15 entry points having a population of about 160 computers that will be processed by the various methods. To demonstrate the results, Network traffic graphs and figures will be used. Through Observations, analysis of the effects of certain behaviors will be done. This results will help in designing a method thats would simplify network security analysis at the IP Layer, in this case a hybrid method. The technical evaluation mainly focuses on deployment in real high speed networks. The method designed shall then be tested in a government ICT department network.

Keywords: Netflow data, Computer Networks, Intrusion Detection, Visualization, Collectors, Anomaly detection, Agents, Security analysis

Edition: Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Share this Article

How to Cite this Article?

Arphaxad Kioko Muia, "Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2018861, Volume 7 Issue 3, March 2018, 1355 - 1362

Enter Your Registered Email Address





Similar Articles with Keyword 'Computer Networks'

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 120 | Weekly Hits: ⮙6

Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 1049 - 1054

Role of ICT for Rural Development in Haryana

Kamaldeep Sangwan, Komal

Share this Article

Downloads: 140 | Weekly Hits: ⮙2

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Similar Articles with Keyword 'Intrusion Detection'

Downloads: 95 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 111 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 115 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1990 - 1993

Advanced Persistent Threat Detection System

Hanu Prasannan, Dharani.J

Share this Article

Similar Articles with Keyword 'Visualization'

Downloads: 109 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 3141 - 3144

Interrelated Document Warehouse Report Visualization

V. Vivek, N. J. Subashini

Share this Article

Downloads: 122 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 548 - 551

RoloKnow: An Analytic Framework for Mobile Applications and Games

Aman Nigam, Hrishikesh Pallod, Saurabh Abhale, Sidhesh Badrinarayan

Share this Article

Downloads: 140 | Weekly Hits: ⮙2

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Downloads: 142 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Information Technology, India, Volume 8 Issue 2, February 2019

Pages: 1453 - 1455

Augmented Reality Based Book Visualization Using Marker Based Technique

Bhaskar Kapoor, Eeshaan Raaj Kalra, Deepak Navaria

Share this Article

Downloads: 192 | Weekly Hits: ⮙5 | Monthly Hits: ⮙14

Research Paper, Information Technology, Kenya, Volume 7 Issue 10, October 2018

Pages: 185 - 192

Social Media Mining Methods Used to Improve Business Intelligence at Safaricom Public Limited Company

Caroline Kendi, Dr Collins Oduor

Share this Article

Similar Articles with Keyword 'Anomaly detection'

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 126 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1142 - 1145

Intrusion Detection Using Data Mining Approach

Kamble Jayshree R., Rangdale S.P.

Share this Article

Downloads: 140 | Weekly Hits: ⮙2

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article

Similar Articles with Keyword 'Agents'

Downloads: 91 | Weekly Hits: ⮙2 | Monthly Hits: ⮙14

Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018

Pages: 559 - 563

Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghanas Financial Sector

Carlo K.M.H. Adadevoh, Benjamin Ntim

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018

Pages: 593 - 598

Intelligent Agents Based Fuzzy Liquidity Management Technique for Mobile Money Transfer

Millicent Murithi, George Okeyo, Michael Kimwele

Share this Article

Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙14

Research Paper, Information Technology, India, Volume 3 Issue 8, August 2014

Pages: 1127 - 1130

Efficient Intelligent Virtual Agents for Developing Game Application Using PRS Engine

Shanthi. P, Maheswari. P

Share this Article

Downloads: 119 | Weekly Hits: ⮙6

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 380 - 387

A Ubiquitous ?M-Health? Application Using Android Appliances

Mayur Sanjay Potdar, Ishwar Bapu Pawar

Share this Article

Downloads: 120 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Information Technology, Kenya, Volume 6 Issue 9, September 2017

Pages: 1748 - 1755

Intelligent Agents as Staff Allocation Optimization Assistants in ICT Services Support

Julia N. Korongo, David M. Gichoya, Damaris N. Odero

Share this Article

Similar Articles with Keyword 'Security analysis'

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 1777 - 1781

A Secure Approach for Deduplication using Hybrid Cloud

Yusuf Aliyu Adamu

Share this Article

Downloads: 140 | Weekly Hits: ⮙2

Research Paper, Information Technology, Kenya, Volume 7 Issue 3, March 2018

Pages: 1355 - 1362

Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia

Share this Article



Top