Abstract

The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance.

Highlights

  • The Internet is a worldwide network of interconnected computers enabling users to share information along multiple channels

  • The innovation is the combination of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) known as Intrusion Detection and Prevention Systems (IDPS) capable of detecting and preventing attacks from happening

  • This paper presents an overview of IDPS followed by their classifications and applications

Read more

Summary

Introduction

The Internet is a worldwide network of interconnected computers enabling users to share information along multiple channels. Intrusion detection is the process of monitoring the events occurring in a computer system/ network and analyzing them for signs of possible attacks, which can lead to violations or imminent threats of violation of computer security policies, of the organization. Prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can attempt to stop possible incidents. IPS on the other hand is software that has all the capabilities of IDS and can attempts to stop possible incidents. For brevity the term Intrusion Detection and Prevention Systems (IDPS) is used throughout the rest of this article to refer to both IDS and IPS technologies

IDPS Components
Types of IDPS
Techniques of Intrusion Detection
Types of Analysis Techniques
Related Works
Architecture of HawkEye Solutions
Working Principle of HawkEye Solutions
Ping Scan
Trace Route Scan
Packet Sniffing
Implementation Results
Comparative Analysis
10. Issues and Challenges
11. Conclusions
Design Parameters
12. References
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call