International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-5  ( May, 2021 )
Past issues
  1. Volume-9,Issue-4  ( Apr, 2021 )
  2. Volume-9,Issue-3  ( Mar, 2021 )
  3. Volume-9,Issue-2  ( Feb, 2021 )
  4. Volume-9,Issue-1  ( Jan, 2021 )
  5. Volume-8,Issue-12  ( Dec, 2020 )
  6. Volume-8,Issue-11  ( Nov, 2020 )
  7. Volume-8,Issue-10  ( Oct, 2020 )
  8. Volume-8,Issue-9  ( Sep, 2020 )
  9. Volume-8,Issue-8  ( Aug, 2020 )
  10. Volume-8,Issue-7  ( Jul, 2020 )

Statistics report
Sep. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 100
Paper Published : 1307
No. of Authors : 3297
  Journal Paper


Paper Title :
MIDS: A Decentralized, Multi-Intrusion Detection System

Author :Suraj Krishnamoorthy, Swapnil Girme, Akshay Nair, Abhishek Gaikwad, S.S. Pawar

Article Citation :Suraj Krishnamoorthy ,Swapnil Girme ,Akshay Nair ,Abhishek Gaikwad ,S.S. Pawar , (2015 ) " MIDS: A Decentralized, Multi-Intrusion Detection System " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 61-63, Volume-3, Issue-5

Abstract : Over the past decade, information security has become a priority like no other. Due to no concrete method of monitoring what applications may be installed, unsuspecting users may inadvertently introduce vulnerabilities. Due to this oversight, malicious intruders can exploit the introduced vulnerabilities to mount any number of attacks. An example is a full Distributed Denial-of-Service (DDoS) attack which comprises of multi-step exploitation, vulnerability scanning, victimizing identified vulnerable virtual machines, converting them to zombies, and finally DDoS attacks through the victim machine s. Another example is a Man-in-the-Middle attack, where an attacker impersonates his/her victims before relaying independent messages, making it look like they are talking to each other. In lieu of this, we propose a decentralized, Multi- Intrusion Detection System (MIDS), which is built on an attack graph analytical model. Attack graphs depict ways in which an adversary can exploit vulnerabilities to break into a system. This will help us drastically improve attack detection and mitigate attack consequences. Keywords- Intrusion Detection System, Network, Security, Mul Ti-Intrusion, Attack Graph, DDoS, Man-in-the-Middl e

Type : Research paper

Published : Volume-3, Issue-5


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2051   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 70
| Published on 2015-05-07
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY