Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Network Security: Hybrid IDPS

Youssef Senhaji, Hicham Medromi. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2015
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Youssef Senhaji, Hicham Medromi
Download full text
  1. Youssef Senhaji and Hicham Medromi. Article: Network Security: Hybrid IDPS. International Journal of Applied Information Systems 9(5):5-8, August 2015. BibTeX

    	author = "Youssef Senhaji and Hicham Medromi",
    	title = "Article: Network Security: Hybrid IDPS",
    	journal = "International Journal of Applied Information Systems",
    	year = 2015,
    	volume = 9,
    	number = 5,
    	pages = "5-8",
    	month = "August",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"


This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to three threat detection methods. At the end of this paper, we developed a hybrid system consisting of a software IDPS represented by a probe developed under Visual C ++ and an embedded solution developed under Python in an Arduino YUN board. We carry out a series of computer attacks on our detection system to assess its response time.


  1. Open Information Security Foundation. « Getting Started With Suricata ». OISF, 2011
  2. Karen Scarfone, Peter Mell. “Guide to Intrusion Detection and Prevention Systems IDPS”. NIST. US Departement of Commerce. 2007
  3. Daniel Guinier. “Sécurité et qualité des systèmes d'information - Approche systémique”. Masson. 1992
  4. Boriana Ditcheva, Lisa Fowler. “Signature-based Intrusion Detection”. University of North Carolina at Chapel Hill. 2005
  5. Martin Roesch, Chris Green, Sourcefire, Inc. “SNORT User’s Manual 2.9.0”. The Snort Project. 2010
  6. WINPCAP documentation. Copyright (c) 2002-2005 Politecnico di Torino Dsfg
  7. Rachid Guerraoui, Lu´ıs Rodrigues, “Introduction to reliable distributed programming’’, Springer-Verlag, August 24, 2005.
  8. Web Site: Arduino -
  9. Y.SENHAJI, “Network Security: Distributed Agents Approach’’, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 01, Issue 02, July-August 2012
  10. Y.SENHAJI, H.MEDROMI, “Network Security: ARDUINO Yun Based IDS’’, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 4, Issue 4, July - August 2015


Network Security, IDPS, Real Time, Embedded System, Distributed System, Arduino.