Securing the Network Using Signature Based IDS in Network Intrusion Detection Systems

Authors(1) :-G. Saraniya

A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. NIDS is an intrusion detection system that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity. Intrusion detection is an important technology in business sector as well as the research area. It inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. A signature based IDS will survey the packets on the network and compare them against a database of signatures or attributes from known attackers. In this system the attack log displays the list of attacks to the administrator for Unauthorized action. This system works as an alert device in the event of attacks directed towards an entire network.

Authors and Affiliations

G. Saraniya
Assistant Professor, KG College of Arts and Science Coimbatore, Tamil Nadu, India

Network Intrusion Detection System, Online matching algorithm, Signature Based IDS

  1. B. Mukherjee, T.L. Heberlein, K.N. Levitt, Network intrusion detection, IEEE Network 8 (3), 1994, pages 26-41
  2. C. Krugel, T. Toth, Distributed Pattern Detection for Intrusion Detection, Conference Proceedings of the Network and Distributed System Security SymposiumNDSS'02,2002,http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/kruege.ps.
  3. Internet Security Systems, Inc., RealSecure,http://www.iss.net/prod/rsds.html, 1997.  Robert Graham, FAQ: Network  IntrusionDetectionSystemshttp://www.robertgraham.com/pubs/network-intrusion-detection.html#2.1, last accessed on March 9, 2004
  4. J. Van Ryan, SAIC's Center for Information Security, Technology Releases CMDS Version 3.5, http://www.saic.com/news/may98/news05-15-98.html, 1998.
  5. Vikram Gupta, Srikanth Krishnamurthy,and Michalis Faloutsos. Denial of ServiceAttacks at the MAC Layer in WirelessAd Hoc Networks. In Proceedings of 2002MILCOM Conference , Anaheim, CA, October 2002.
  6. Jump up to: a b www.users.cs.york.ac.uk/~jac/PublishedPapers/AdhocNetsFinal.pdf
  7. http://cial.csie.ncku.edu.tw/presentation/group_pdf/a%20novel%20hierarchical%20matching%20algorithm%20for%20intrusion%20detection%20systems.pdf

Publication Details

Published in : Volume 2 | Issue 1 | January-February 2019
Date of Publication : 2019-01-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 99-101
Manuscript Number : SHISRRJ192119
Publisher : Shauryam Research Institute

ISSN : 2581-6306

Cite This Article :

G. Saraniya, "Securing the Network Using Signature Based IDS in Network Intrusion Detection Systems ", Shodhshauryam, International Scientific Refereed Research Journal (SHISRRJ), ISSN : 2581-6306, Volume 2, Issue 1, pp.99-101, January-February.2019
URL : https://shisrrj.com/SHISRRJ192119

Article Preview