Affiliation:
1. Jacobs Engineering Group, USA
2. Prairie View A&M University, USA
Abstract
Designing, planning, and managing telecommunication, industrial control, and enterprise networks with special emphasis on effectiveness, efficiency, and reliability without considering security planning, management, and constraints have made them vulnerable. They have become more vulnerable due to their recent connectivity to open networks with the intention of establishing decentralized management and remote control. Existing Intrusion Prevention and Detection Systems (IPS and IDS) do not guarantee absolute security. The new IDS, which employs both signature-based and anomaly detection as its analysis strategies, will be able to detect both known and unknown attacks and further isolate them. Auto-reclosing techniques used on long rural power lines and multi-resolution techniques were used in developing this IDS, which will help update existing IPSs. It should effectively block Distributed Denial of Service attack (DDoS) based on SNY-flood attacks and help eliminate four out of the five major limitations of existing IDSs and IPSs.
Reference98 articles.
1. Akujuobi, C. M., & Ampah, N. K. (2007). Enterprise network intrusion detection and prevention system. In Proceedings of Society of Photographic Instrumentation Engineers Defense and Security Symposium (Vol. 6538, pp. 1-12). Academic Press.
2. An intrusion detection technique based on change in Hurst parameter with application to network security.;C. M.Akujuobi;International Journal of Computer Science and Network Security,2007
3. MapReduce intrusion detection system based on a particle swarm optimization clustering algorithm
4. Amanullah, M. T. O., Kalam, A., & Zayegh, H. (2005). Network security vulnerabilities in SCADA and EMS. In Proceedings of Transmission and Distribution Conference and Exhibition: Asia and Pacific (pp. 1-6). Academic Press.
5. Protecting Enterprise Networks