

Intrusion Detection and Prevention System: Technologies and Challenges |
Pages: 384-395 (12) | [Full Text] PDF (462 KB) |
M Azhagiri, A Rajesh, S Karthik |
Research Scholar, St.Peters University, Avadi, Chennai-600054, IndiaProfessor/CSE, C Abdul Hakeem College of Engineering and Technology, Melvisharam, Tamil Nadu 632509, IndiaAssociate Professor/IT, V.M.K.V Engineering College, Salem, Tamil Nadu 636308, India |
Abstract - Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. An intrusion detection system (IDS) is software that automates the intrusion detection process. An intrusion prevention system (IPS) is software that has all the capabilities of IDS and can also attempt to stop possible incidents. This paper provides an overview of IDPS technologies. It explains the key functions that IDPS technologies perform and the detection methodologies that they use. Next, it highlights the most important characteristics of each of the major classes of IDPS technologies. The paper also discusses various types of IDPS security capabilities, technology limitations and challenges. |
Index Terms - Intrusion, IDPS Detection, Security |
C itation - M Azhagiri, A Rajesh, S Karthik. "Intrusion Detection and Prevention System: Technologies and Challenges." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 384-395. |
Optimization of Computer Network for Efficient Performance |
Pages: 396-402 (7) | [Full Text] PDF (791 KB) |
O Georgina N and T K.Richard |
Department of Mathematical Sciences and IT, Federal University Dutsinma, Katsina state, Nigeria. |
Abstract - Network centralization is an act that promises enormous paybacks in education, it centralizes data access and replaces many individual systems and unique processes with common management procedures resulting in potentially dramatic improvement in equipment utilization and lower operating costs. It has other benefits among them are: Greater availability, Better and more responsive service level, Flexibility to rapid response to change, Cost effective computing, Better security, Quality education, Organizational efficiency, improved administration. In this paper, OPNET IT Guru Academic Edition modeling software was used to perform capacity planning study. The application was used to predict the impact the application deployed over the network will have on the network resources and the impact the network itself will have on the application performance. |
Index Terms - Network Optimization, WAN, OPNET, Computer Network |
C itation - O Georgina N and T K.Richard. "Optimization of Computer Network for Efficient Performance." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 396-402. |
Studying the Efficiency of using Private Certificate to Solve the Peer-to-Peer Distributed Denial of Service Attack on Cloud Computing |
Pages: 403-411 (9) | [Full Text] PDF (377 KB) |
N K Khorsheed, O K Khoursheed, T T Hamza, M z Rashad |
Koya university, Dep of SW engineeringAlMansoura University, Dep.of Computer Science |
Abstract - This paper presents a treatise about cloud computing security risk and attack, we explained the definition of cloud computing and the P2P network in order to understand the infrastructure and how Denial of Service attacks consumes and confuses the network infrastructure, the two type of Denial of Service attack DoS and DDoS aimed to flood the network storage and to exhaust the network resource. Among the available solutions is SSL certificates but we found Its not enough to solve and to prevent DDoS/DoS attacks, that due to the existence of SSL handshake attack. The ideal solution for Denial of Service attacks is by using private certificate protected from third party or to use multi-type and multi-level of private certificate keys. For strengthening our work we took two study cases Prolexic cloud and Parse cloud. |
Index Terms - NIST, Self-Provisioning, DoS, Distributed, DDos, Fully-Qualified Domain Name, Certificates, Authorities Domain, Wildcard, SAN, UCC, Prolexic , Handshake |
C itation - N K Khorsheed, O K Khoursheed, T T Hamza, M z Rashad. "Studying the Efficiency of using Private Certificate to Solve the Peer-to-Peer Distributed Denial of Service Attack on Cloud Computing." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 403-411. |
3I, Algorithm for Object Learning Production |
Pages: 412-416 (5) | [Full Text] PDF (595 KB) |
K ACHTAICH, H BENLAHMAR, N ACHTAICH |
Analyze, Modeling and simulation Laboratory, LAMS, Faculty of Sciences Ben MSick, Hassan II, Mohemmadia University, Casablanca, MOROCCOInformation Technologie and Modélisation Laboratory, TIM, Faculty of Sciences Ben Sick, Hassan II, Mohemmadia University, Casablanca, MOROCCO |
Abstract - Learning object is THE main component to propose an optimal, specific, personal learning content. It allows several scenarios depending on the learner profile, learning context and the device specifications. The same learning object can be used and reused in different contexts. In this article, we present the 3I algorithm to optimally produce the learning objects. We describe the three steps to have a finished, ready to use learning object. |
Index Terms - Learning Object, 3I algorithm, Context, Profile, Learning Content |
C itation - K ACHTAICH, H BENLAHMAR, N ACHTAICH. "3I, Algorithm for Object Learning Production." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 412-416. |