IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 7, July 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Detecting The Attack On The Distributed Mobile Notice Board Using Android

[Full Text]

 

AUTHOR(S)

Keerthi Rajan, V. Visveswaran

 

KEYWORDS

Index terms: Intrusion detection system, malicious activities, notice board system, probe, dos, r2l, and u2r.

 

ABSTRACT

Abstract: Intrusion detection system is the key component for ensuring the safety of systems and networks. There are a number of challenges facing by the intrusion detection; an intrusion detection system must efficiently find out the malicious activities in a network and must perform reliably to cope with the network traffic. This paper develops an advanced notice board system using android where the registered members can post their content and which can be seen by the entire member users. Here performing four kind of intrusion detection for the notice board; probe, dos, r2l and u2r detection. Layer based intrusion detection approach is used to detect the four attacks which has been mentioned before.

 

REFERENCES

[1] SANS Institute—Intrusion Detection FAQ, http://www.sans.org/ resources/idfaq/, 2010.

[2] Y.-S. Wu, B. Foo, Y. Mei, and S. Bagchi, “Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS,” Proc. 19th Ann. Computer Security Applications Conf. (ACSAC ’03), pp. 234-244, 2003.

[3] R. Bace and P. Mell, Intrusion Detection Systems, Computer Security Division, Information Technology Laboratory, Nat’l Inst. of Standards and Technology, 2001.

[4] Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800–94). Retrieved 1 January 2010.

[5] A strict anomaly detection model for IDS, Phrack 56 0x11, Sasha/Beetle.

[6] Herv´e Debar, An Introduction to Intrusion-Detection Systems.

[7] Mr.C.Saravanan, Mr.M.V.Shivsankar, Prof.P.Tamije Selvy, Mr.S.Anto,
An Optimized Feature Selection for Intrusion Detection using Layered Conditional Random Fields with MAFS, 2012.

[8] Ankita Gaur, Vineet Richariya, A Layered Approach for Intrusion Detection Using Meta-modeling with Classification Techniques.

[9] Brajesh Patel, An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols.

[10] KDD Cup 1999 Intrusion Detection Data, http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html, 2010.