CFP last date
15 May 2024
Reseach Article

Network Security: Hybrid IDPS

by Youssef Senhaji, Hicham Medromi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 9 - Number 5
Year of Publication: 2015
Authors: Youssef Senhaji, Hicham Medromi
10.5120/ijais2015451408

Youssef Senhaji, Hicham Medromi . Network Security: Hybrid IDPS. International Journal of Applied Information Systems. 9, 5 ( August 2015), 5-8. DOI=10.5120/ijais2015451408

@article{ 10.5120/ijais2015451408,
author = { Youssef Senhaji, Hicham Medromi },
title = { Network Security: Hybrid IDPS },
journal = { International Journal of Applied Information Systems },
issue_date = { August 2015 },
volume = { 9 },
number = { 5 },
month = { August },
year = { 2015 },
issn = { 2249-0868 },
pages = { 5-8 },
numpages = {9},
url = { https://www.ijais.org/archives/volume9/number5/778-2015451408/ },
doi = { 10.5120/ijais2015451408 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:00:11.109359+05:30
%A Youssef Senhaji
%A Hicham Medromi
%T Network Security: Hybrid IDPS
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 9
%N 5
%P 5-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to three threat detection methods. At the end of this paper, we developed a hybrid system consisting of a software IDPS represented by a probe developed under Visual C ++ and an embedded solution developed under Python in an Arduino YUN board. We carry out a series of computer attacks on our detection system to assess its response time.

References
  1. Open Information Security Foundation. « Getting Started With Suricata ». OISF, 2011
  2. Karen Scarfone, Peter Mell. “Guide to Intrusion Detection and Prevention Systems IDPS”. NIST. US Departement of Commerce. 2007
  3. Daniel Guinier. “Sécurité et qualité des systèmes d'information - Approche systémique”. Masson. 1992
  4. Boriana Ditcheva, Lisa Fowler. “Signature-based Intrusion Detection”. University of North Carolina at Chapel Hill. 2005
  5. Martin Roesch, Chris Green, Sourcefire, Inc. “SNORT User’s Manual 2.9.0”. The Snort Project. 2010
  6. WINPCAP documentation. Copyright (c) 2002-2005 Politecnico di Torino Dsfg
  7. Rachid Guerraoui, Lu´ıs Rodrigues, “Introduction to reliable distributed programming’’, Springer-Verlag, August 24, 2005.
  8. Web Site: Arduino - http://www.arduino.cc/.
  9. Y.SENHAJI, “Network Security: Distributed Agents Approach’’, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 01, Issue 02, July-August 2012
  10. Y.SENHAJI, H.MEDROMI, “Network Security: ARDUINO Yun Based IDS’’, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 4, Issue 4, July - August 2015
Index Terms

Computer Science
Information Sciences

Keywords

Network Security IDPS Real Time Embedded System Distributed System Arduino.