2019
DOI: 10.1109/access.2019.2895898
|View full text |Cite
|
Sign up to set email alerts
|

A New Architecture for Network Intrusion Detection and Prevention

Abstract: This paper presents an investigation, involving experiments, which shows that current network intrusion, detection, and prevention systems (NIDPSs) have several shortcomings in detecting or preventing rising unwanted traffic and have several threats in high-speed environments. It shows that the NIDPS performance can be weak in the face of high-speed and high-load malicious traffic in terms of packet drops, outstanding packets without analysis, and failing to detect/prevent unwanted traffic. A novel quality of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 18 publications
(12 reference statements)
0
10
0
Order By: Relevance
“…Based on the location, they can be divided into host-based IDS and network-based IDS, the main object of the host-based IDS is the system's behaviors of the target program [8], and the main object of the network-based IDS is the analysis of network traffic. According to different ways of finding intrusions, IDS can be divided into feature-based, anomaly-based, and hybrid-based [9]. Feature-based IDS is based on the predefined network attack mode of network security experts.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the location, they can be divided into host-based IDS and network-based IDS, the main object of the host-based IDS is the system's behaviors of the target program [8], and the main object of the network-based IDS is the analysis of network traffic. According to different ways of finding intrusions, IDS can be divided into feature-based, anomaly-based, and hybrid-based [9]. Feature-based IDS is based on the predefined network attack mode of network security experts.…”
Section: Related Workmentioning
confidence: 99%
“…Testing was done from Wincap, Flooder Packet, and Transmission Control Protocol (TCP) replay tools as attackers transmit TCP and User Datagram Protocol (UDP) traffic attacks. Testing with Novel NIDPS method architecture and integrating with Cisco Layer 3 switch resulted in better attack prevention and detection methods despite massive traffic attacks or high-speed traffic to internal networks [6].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The eq. [6] shows another optimizer called Adamax. The difference between Adam and Adamax is, it extends the L2 norm of past gradients to L-infinity norm.…”
Section: Kernel Principal Component Analysis (Kpca)mentioning
confidence: 99%
“…Additionally, data which will be exchanged among these devices will be enormous. This made our research focus on identifying attacks more rapidly [6] [7]. Therefore efficient IDS for resource-constrained devices is required to identify and stop malicious activities.…”
Section: Introductionmentioning
confidence: 99%