International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 141

Research Paper | Information Technology | Kenya | Volume 7 Issue 3, March 2018


Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer

Arphaxad Kioko Muia


Abstract: Around us are Computer networks that necessitate effective communication, sharing of knowledge, research and development, education modernization, e-commerce and entertainment just to mention a few. The present days network systems are increasingly getting exposed to many security threats and vulnerabilities including denial of service (DoS), scanning, password cracking, spoofing, eavesdropping, spamming, phishing, worms among others. These security threats and vulnerabilities have seen organizations and companies implement security policies for their networks. However, most of these security policies only inspect the network traffic passing through them denying or permitting packets passage based on their active set of rules. This ideally leaves the network exposed to attacks from outside and within. This paper presents technical evaluation methods for network security at the IP layer. This will be done through experiments on network traffic data. This will involve Network analyzers for collecting data from 15 entry points having a population of about 160 computers that will be processed by the various methods. To demonstrate the results, Network traffic graphs and figures will be used. Through Observations, analysis of the effects of certain behaviors will be done. This results will help in designing a method thats would simplify network security analysis at the IP Layer, in this case a hybrid method. The technical evaluation mainly focuses on deployment in real high speed networks. The method designed shall then be tested in a government ICT department network.


Keywords: Netflow data, Computer Networks, Intrusion Detection, Visualization, Collectors, Anomaly detection, Agents, Security analysis


Edition: Volume 7 Issue 3, March 2018,


Pages: 1355 - 1362


How to Cite this Article?

Arphaxad Kioko Muia, "Development of a Hybrid Intrusion Detection System for Security Analysis at the IP Layer", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART2018861, Volume 7 Issue 3, March 2018, 1355 - 1362

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Computer Networks'

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 120

Research Paper, Information Technology, India, Volume 5 Issue 5, May 2016

Pages: 1049 - 1054

Role of ICT for Rural Development in Haryana

Kamaldeep Sangwan, Komal

Share this Article

Similar Articles with Keyword 'Intrusion Detection'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Similar Articles with Keyword 'Visualization'

Downloads: 110

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 3141 - 3144

Interrelated Document Warehouse Report Visualization

V. Vivek, N. J. Subashini

Share this Article

Downloads: 122

Research Paper, Information Technology, India, Volume 4 Issue 7, July 2015

Pages: 548 - 551

RoloKnow: An Analytic Framework for Mobile Applications and Games

Aman Nigam, Hrishikesh Pallod, Saurabh Abhale, Sidhesh Badrinarayan

Share this Article

Similar Articles with Keyword 'Anomaly detection'

Downloads: 114

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1576 - 1580

Intrusion Detection in Wireless Network Using Fuzzy Rules

Ketaki P. Bhusari, Swati G. Kale

Share this Article

Downloads: 126

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 1142 - 1145

Intrusion Detection Using Data Mining Approach

Kamble Jayshree R., Rangdale S.P.

Share this Article

Similar Articles with Keyword 'Agents'

Downloads: 92

Research Paper, Information Technology, Ghana, Volume 7 Issue 9, September 2018

Pages: 559 - 563

Examination of External and Internal Enablers of Organizational E-Readiness to Implement E-Commerce. A Study of Ghanas Financial Sector

Carlo K.M.H. Adadevoh, Benjamin Ntim

Share this Article

Downloads: 105

Research Paper, Information Technology, Kenya, Volume 7 Issue 4, April 2018

Pages: 593 - 598

Intelligent Agents Based Fuzzy Liquidity Management Technique for Mobile Money Transfer

Millicent Murithi, George Okeyo, Michael Kimwele

Share this Article

Similar Articles with Keyword 'data'

Downloads: 324 | Monthly Hits: ⮙1

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Similar Articles with Keyword 'Computer'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Downloads: 102

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Similar Articles with Keyword 'Networks'

Downloads: 97

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Downloads: 101 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 946 - 948

Retail Business Operations Transformation by 5G

Dhanesh Thatikonda

Share this Article

Similar Articles with Keyword 'Intrusion'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

Similar Articles with Keyword 'Detection'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1155 - 1157

Coal Mine Water Level Detection and Reusability

Cilla Mary Mathew

Share this Article
Top