A Combined Protection for Entire Network Based On Immune Inspired Theories
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 6)Publication Date: 2013-06-30
Authors : P.S. ThumilVannan S. Hirutiha;
Page : 339-349
Keywords : Network Traffic; Traffic anomalies; anomaly Detection;
Abstract
The combined protection for entire network identifies the traffic anomalies by monitoring the header information. Some attacks like denial of service led to develop the techniques for identifying the network traffic. The possibilities of traffic-analysis based mechanisms for attack and anomaly detection is also being studied. The motivation for this work came from a need to reduce the likelihood that an attacker may hijack the position machines to stage an attack on a third party. A position may want to prevent or limit misuse of its machines in staging attacks, and possibly limit the liability from such attacks. In particular, the utility of observing packet header data of outgoing traffic, such as destination addresses, port numbers and the number of flows, in order to detect attacks/anomalies originating from the position at the edge of a position is also dealt with. Detecting anomalies/attacks close to the source allows us to limit the potential damage close to the attacking machines. Project approach passively monitors network traffic at regular intervals and analyzes it to find any abnormalities in the aggregated traffic.
Other Latest Articles
- ECOTURISTIC DEVELOPMENT IN DISTRICT OF DELVINA AND IT’ S IMPACT ON SOCIO ? ECONOMIC LIFE
- DYNAMICS OF NITROGEN (N) AND PHOSPHORUS (P) DISCHARGE BY THE RIVER SHKUMBINI OVER DIFFERENT PERIODS
- MODELING OF CONSTITUIVE BEHAVIOR OF WHITE FIR TIMBER TRUSSES
- ASSESSMENT OF ALTERNATIVE REPAIR TECHNIQUES OF RAFTER-TIE BEAM CONNECTIONS
- INTERACTIONS AT METAL INTERFACES-A COMPARISON OF VARIOUS MODEL APROACHES
Last modified: 2013-07-01 00:01:38