A Novel Based Approach to Detect and Take Action Against Network Intrusion in Virtual Machine Network System

Authors

  • Keesara Sravanthi Department of Information Technology, VNRVJIET, Hyderabad, India
  • A. Srinivas Department of Information Technology, VNRVJIET, Hyderabad, India
  • G. Narsing Rao Department of Information Technology, VNRVJIET, Hyderabad, India
  • T. Raghu Department of Information Technology, VNRVJIET, Hyderabad, India
  • P. Rakesh Department of Information Technology, VNRVJIET, Hyderabad, India

Keywords:

Machine Learning algorithm, NIDS, Clustering, Packet signatures

Abstract

The design of intrusion detection systems (IDS) has received significant attention in the field of computer sciences with the massive number of network traffic and security risk. While various methods and strategies have been proposed for tracking Client and company behaviour and analyzed together to detect network intrusion. As there is latent information on further research in the classification and clustering of network packet signatures. We propose that the system of intrusion detection based on network signatures and system studies should be supported in this article. We include a KDDCUPSET which is used to store different modes of attacks and a multi - phase detector to identify potential intruders more effectively and a text-based query generation framework to challenge the detector module`s suspended requesters. If qualities of a received System Packet contest are certified, the classification alerts the admin to the potential precaution with the basis of cruel behavior and the classification must be above 90 percent accurate

 

References

Hoque, Nazrul, et al. "Network attacks: Taxonomy, tools and systems", Journal of Network and Computer Applications 40 (2014): 307-324.

Girardin, Luc. "An Eye on Network Intruder-Administrator Shootouts?, In the Proceedings of the Workshop on Intrusion Detection and Network Monitoring. 1999.

Lee, Wenke, and Salvatore J. Stolfo. "A framework for constructing features and models for intrusion detection systems?, ACM transactions on Information and system security (TiSSEC) 3.4 (2000): 227-261.

R. Lippmann, J. Haines, D. Fried, J. Korba and K. Das. ?The 1999 DARPA off-line intrusion detection evaluation?. Computer networks, vol. 34, no. 4, pp. 579 595, 2000. DOI http://dx.doi.org/10.1016/S13891286(00)00139-0.

Shankar, Umesh, and Vern Paxson. ?Active mapping: Resisting NIDS evasion without altering traffic.? 2003 Symposium on Security and Privacy, 2003. IEEE, 2003.

Weijian Huang, Yan An and Wei Du, "A Multi-Agent-Based Distributed Intrusion Detection System," 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, 2010, pp. V3-141-V3-143, doi: 10.1109/ICACTE.2010.5579686.

Downloads

Published

2020-08-31

How to Cite

[1]
K. Sravanthi, A. Srinivas, G. N. Rao, T. Raghu, and P. Rakesh, “A Novel Based Approach to Detect and Take Action Against Network Intrusion in Virtual Machine Network System”, Int. J. Sci. Res. Net. Sec. Comm., vol. 8, no. 4, pp. 10–13, Aug. 2020.

Issue

Section

Research Article

Similar Articles

<< < 4 5 6 7 8 9 10 11 > >> 

You may also start an advanced similarity search for this article.