International Journal of Computer Networks and Communications Security

Volume 3, Issue 10, October 2015

 

 

 

Intrusion Detection and Prevention System: Technologies and Challenges

Pages: 384-395 (12) | [Full Text] PDF (462 KB)
M Azhagiri, A Rajesh, S Karthik
Research Scholar, St.Peters University, Avadi, Chennai-600054, India
Professor/CSE, C Abdul Hakeem College of Engineering and Technology, Melvisharam, Tamil Nadu 632509, India
Associate Professor/IT, V.M.K.V Engineering College, Salem, Tamil Nadu 636308, India

Abstract -
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. An intrusion detection system (IDS) is software that automates the intrusion detection process. An intrusion prevention system (IPS) is software that has all the capabilities of IDS and can also attempt to stop possible incidents. This paper provides an overview of IDPS technologies. It explains the key functions that IDPS technologies perform and the detection methodologies that they use. Next, it highlights the most important characteristics of each of the major classes of IDPS technologies. The paper also discusses various types of IDPS security capabilities, technology limitations and challenges.
 
Index Terms - Intrusion, IDPS Detection, Security

Citation - M Azhagiri, A Rajesh, S Karthik. "Intrusion Detection and Prevention System: Technologies and Challenges." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 384-395.

 

Optimization of Computer Network for Efficient Performance

Pages: 396-402 (7) | [Full Text] PDF (791 KB)
O Georgina N and T K.Richard
Department of Mathematical Sciences and IT, Federal University Dutsinma, Katsina state, Nigeria.

Abstract -
Network centralization is an act that promises enormous paybacks in education, it centralizes data access and replaces many individual systems and unique processes with common management procedures resulting in potentially dramatic improvement in equipment utilization and lower operating costs. It has other benefits among them are: Greater availability, Better and more responsive service level, Flexibility to rapid response to change, Cost effective computing, Better security, Quality education, Organizational efficiency, improved administration. In this paper, OPNET IT Guru Academic Edition modeling software was used to perform capacity planning study. The application was used to predict the impact the application deployed over the network will have on the network resources and the impact the network itself will have on the application performance.
 
Index Terms - Network Optimization, WAN, OPNET, Computer Network

Citation - O Georgina N and T K.Richard. "Optimization of Computer Network for Efficient Performance." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 396-402.

 

Studying the Efficiency of using Private Certificate to Solve the Peer-to-Peer Distributed Denial of Service Attack on Cloud Computing

Pages: 403-411 (9) | [Full Text] PDF (377 KB)
N K Khorsheed, O K Khoursheed, T T Hamza, M z Rashad
Koya university, Dep of SW engineering
AlMansoura University, Dep.of Computer Science

Abstract -
This paper presents a treatise about cloud computing security risk and attack, we explained the definition of cloud computing and the P2P network in order to understand the infrastructure and how Denial of Service attacks consumes and confuses the network infrastructure, the two type of Denial of Service attack DoS and DDoS aimed to flood the network storage and to exhaust the network resource. Among the available solutions is SSL certificates but we found Its not enough to solve and to prevent DDoS/DoS attacks, that due to the existence of SSL handshake attack. The ideal solution for Denial of Service attacks is by using private certificate protected from third party or to use multi-type and multi-level of private certificate keys. For strengthening our work we took two study cases Prolexic cloud and Parse cloud.
 
Index Terms - NIST, Self-Provisioning, DoS, Distributed, DDos, Fully-Qualified Domain Name, Certificates, Authorities Domain, Wildcard, SAN, UCC, Prolexic , Handshake

Citation - N K Khorsheed, O K Khoursheed, T T Hamza, M z Rashad. "Studying the Efficiency of using Private Certificate to Solve the Peer-to-Peer Distributed Denial of Service Attack on Cloud Computing." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 403-411.

 

3I, Algorithm for Object Learning Production

Pages: 412-416 (5) | [Full Text] PDF (595 KB)
K ACHTAICH, H BENLAHMAR, N ACHTAICH
Analyze, Modeling and simulation Laboratory, LAMS, Faculty of Sciences Ben MSick, Hassan II, Mohemmadia University, Casablanca, MOROCCO
Information Technologie and Modélisation Laboratory, TIM, Faculty of Sciences Ben Sick, Hassan II, Mohemmadia University, Casablanca, MOROCCO

Abstract -
Learning object is THE main component to propose an optimal, specific, personal learning content. It allows several scenarios depending on the learner profile, learning context and the device specifications. The same learning object can be used and reused in different contexts. In this article, we present the 3I algorithm to optimally produce the learning objects. We describe the three steps to have a finished, ready to use learning object.
 
Index Terms - Learning Object, 3I algorithm, Context, Profile, Learning Content

Citation - K ACHTAICH, H BENLAHMAR, N ACHTAICH. "3I, Algorithm for Object Learning Production." International Journal of Computer Networks and Communications Security 3, no. 10 (2015): 412-416.