CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Detecting Network Anomalies using IP Gray Space Analysis and Preventing from it by using Machine Identification Code

by Sandip S. Patil, Nitin Y. Suryavanshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 34 - Number 4
Year of Publication: 2011
Authors: Sandip S. Patil, Nitin Y. Suryavanshi
10.5120/4091-5907

Sandip S. Patil, Nitin Y. Suryavanshi . Detecting Network Anomalies using IP Gray Space Analysis and Preventing from it by using Machine Identification Code. International Journal of Computer Applications. 34, 4 ( November 2011), 58-63. DOI=10.5120/4091-5907

@article{ 10.5120/4091-5907,
author = { Sandip S. Patil, Nitin Y. Suryavanshi },
title = { Detecting Network Anomalies using IP Gray Space Analysis and Preventing from it by using Machine Identification Code },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 34 },
number = { 4 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 58-63 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume34/number4/4091-5907/ },
doi = { 10.5120/4091-5907 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:20:47.514842+05:30
%A Sandip S. Patil
%A Nitin Y. Suryavanshi
%T Detecting Network Anomalies using IP Gray Space Analysis and Preventing from it by using Machine Identification Code
%J International Journal of Computer Applications
%@ 0975-8887
%V 34
%N 4
%P 58-63
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security with the intranet and internet becomes the very important issue as the total business is going to migrate towards the e-business. Security is not just about keeping people out of your network but also provides access into your network in the way you want to provide it, allowing the people to work together. When we are going to give the access to the outside people there may be the risk of some mischief with the resources of the network. The most important thing is the information of the organization, and the external or the internal persons who are not having the permissions of accessing the information may access the organization information and may harm to the organization In Network Security concern network access control and security assurance is a major issue to secure the private or public network from abnormal user. In this paper we are presenting the design and implementation of HNADP model which is used to detect the anomalies using IP Gray Space analysis and preventing the network from such anomalies using MAC address filtering.

References
  1. Yogendra Kumar JAIN, Sandip S. PATIL “Design of Hybrid Network Anomalies Detection System (H-NADS) Using IP Gray Space Analysis” International Journal of Informatica Economică vol. 13, no. 2/2009 110
  2. K. Jackson, Intrusion Detection Systems (IDS): Product Survey, Los Alamos National Laboratory,
  3. H. Debar, M. Dacier, and A. Wespi, Towards a Taxonomy of Intrusion Detection Systems, Computer Networks, 31(8):805-822, April 1999
  4. 4 Wei Lu, Mahbod T. and Ali A.” Detecting Network Anomalies Using Different Wavelet Basis Functions”, Communication Networks and Services Research Conference 978-0-7695-3135-9 IEEE August, 2008 .
  5. D.E.Denning , “An Intrusion Detection Model.” IEEE Transactions on software engineering , 2:222
  6. Y.Yasami,M.Farahmand,V.Zargari “An ARP-based Anomaly Detection Algorithm Using Hidden Markov Model in Enterprise Networks”, (ICSNC 2007),IEEE 2007.
  7. Gaia Maselli , Luca Deri , Stefano Suin , “Design and Implementation of Anomaly Detection System”2007
  8. Y. Jin, G. Simon, K.Xu, Z.-L. Zhang and V. Kumar, “Gray's Anatomy: Dissecting Scanning Activities Using IP Gray Space Analysis”. In Proc. of SysML'07, 2007
  9. Xiuyao Song, Mingxi Wu, Christopher Jermaine, and Sanjay Ranka” Conditional Anomaly Detection”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 19, NO. 5, MAY 2007
  10. Giulia Bruno, Paolo Garza, Elisa uintarelli, Rosalba Rossato,” Anomaly Detection in XML databases by means , IEEE July 2007
  11. Ricardo C. Carrano, Luiz C. S. Magalhães, Débora C. Muchaluat Saade and Célio V. N. Albuquerque “IEEE 802.11s Multihop MAC: A Tutorial” , IEEE 802.11S MULTIHOP MAC: A TUTORIAL 53 IEEE 2011
Index Terms

Computer Science
Information Sciences

Keywords

Detection and Prevention IP Gray Space MAC Address