CFP last date
20 May 2024
Reseach Article

Host-based Intrusion Detection and Prevention System (HIDPS)

by Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 26
Year of Publication: 2013
Authors: Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh
10.5120/12136-8419

Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh . Host-based Intrusion Detection and Prevention System (HIDPS). International Journal of Computer Applications. 69, 26 ( May 2013), 28-33. DOI=10.5120/12136-8419

@article{ 10.5120/12136-8419,
author = { Kopelo Letou, Dhruwajita Devi, Y. Jayanta Singh },
title = { Host-based Intrusion Detection and Prevention System (HIDPS) },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 26 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number26/12136-8419/ },
doi = { 10.5120/12136-8419 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:22.407848+05:30
%A Kopelo Letou
%A Dhruwajita Devi
%A Y. Jayanta Singh
%T Host-based Intrusion Detection and Prevention System (HIDPS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 26
%P 28-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is deliberated to provide a model for Host-based Intrusion Detection and Prevention (HIDPS). HIDPS is increasingly becoming important to protect the host computer systems and its own network activities. HIDPS with intelligence is integrated into the computer systems to detect the intruder attacks activities, malicious Behaviour, application anomalies and protect the Information Systems from intruders and report the events to the HIDPS System Administrator. HIDPS is composed of software to monitor and analyze events occurring in the computer systems and information systems and to identify and stop potentially harmful incidents to the Systems. In this context, computer security is an essential property. HIDPS is one of the promising research areas of computer security as most of the security violations in systems occur due to malicious code and intruder activities being able to penetrate to the system barriers. Malicious code and intruder activities affect the computer systems by compromising integrity, confidentiality and availability of resources. It also changes the system Behaviour and extracts the system's vital informations. This paper reviewed and compared the related various research papers on HIDPS to provide a suitable norm on HIDPS at two levels of intrusion detection and prevention i. e. , user level and kernel level along with two phases of intrusion detection engines- Misuse and Anomaly detections for the best-fit system to any unique host computer systems.

References
  1. James P. Anderson. 1980. Computer Security Threat Monitoring and Surveillance. Technical report Co, Fort Washington.
  2. Dorothy E. Denning. 1987. An Intrusion-Detection Model. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. SE-13, NO. 2.
  3. Karen Scarfone and Peter Mell. 2012. Guide to Intrusion Detection and Prevention Systems. National Institute of Standards and Technology, U. S.
  4. Mauritian Computer Emergency Response Team. 2011. Guideline on Intrusion Detection and Prevention Systems. National Computer Board, Issue No. 10.
  5. Srinivas Mukkamala, Andrew H. Sung, and Ajith Abraham. 2005. Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, Vol. 28, Issue 2, pp. 167–182.
  6. Mohammadreza Ektefa, Sara Memar, Fatimah Sidi and Lilly Suriani Affendey. 2010. Intrusion Detection Using Data Mining Techniques. Proceedings Of IEEE International Conference on Information Retrieval & Knowledge Management, Exploring Invisible World, CAMP
  7. Upendra. 2013. An Efficient Feature Reduction Comparison of Machine Learning Algorithms for Intrusion Detection System. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol. 2, Issue 1.
  8. Reza Entezari-Maleki, Arash Rezaei, and Behrouz Minaei-Bidgoli. Comparison of Classification Methods Based on the Type of Attributes and Sample Size.
  9. Sushil Kumar Chaturvedi, Vineet Richariya and Nirupama Tiwari. 2012. Anomaly Detection in Network using Data mining Techniques. International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Vol. 2, Issue 5.
  10. Tarek S. Sobh. 2005. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces.
  11. Joseph S. Sherif and Tommy G. Dearmond. 2002. Intrusion Detection: Systems and Models . California Institute of Technology, JPL, Pasadena, CA 91 I09.
  12. Pieter de Boer & Martin Pels. 2005. Host-based Intrusion Detection Systems.
  13. Palika Jajoo and Dayama Meeta. 2011. Intrusion Detection And Prevention System. International conference on Advanced Computing, Communication and Networks'.
  14. Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel,Avi Patel, Muttukrishnan Rajarajan. 2012. Review A survey of intrusion detection techniques in Cloud . Journal of Network and Computer Applications, Vol. 36, pp. 42–576.
  15. Hung-Jen Liao, Chun-Hung Richard Lin ,Ying-Chih Lin, Kuang-Yuan Tung. 2013. Intrusion detection system: A comprehensive review. Journals of network and computer Applications, Vol. 36, pp. 16-24.
  16. Bilal Maqbool Beigh and Prof. M. A. Peer. 2012. Intrusion Detection and Prevention System: Classification and Quick Review. ARPN Journal of Science and Technology, Vol. 2, No. 7, ISSN 2225-7217.
  17. Ant Allan. 2002. Intrusion Detection Systems (IDSs): Perspective. Technology Overview, DPRO-95367.
  18. Giovanni Vigna and Christopher Kruegel. 2005. Host-Based Intrusion Detection, JWBS001C.
  19. Andreas Fuchsberger. 2005. Intrusion Detection Systems and Intrusion Prevention Systems. Information Security Technical Report, Vol. 10, pp. 134-139.
  20. Herve Debar. 2000. An Introduction to Intrusion-Detection Systems. IBM Research and ZurichResearch Laboratory, Switzerland.
  21. Muriel Baudrion. 2004. Fighting system intrusions: from detection to prevention. Global Information Assurance Certification Paper, Amsterdam.
  22. Srilatha Chebrolua, Ajith Abrahama, Johnson P. Thomas. 2005. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, Vol. 24, pp. 295-307.
  23. M. Govindarajan, RM. Chandrasekaran. 2011. Intrusion detection using neural based hybrid classi?cation methods. Computer Networks.
  24. Sushil Kumar Chaturvedi and Vineet Richariya. 2012. Attack Detection over Network based on C45 and RF Algorithms. International Journal of Computer Applications Vol. 57, No. 9.
  25. Wun-Hwa Chen, Sheng-Hsun Hsu , Hwang-Pin Shen. 2005. Application of SVM and ANN for intrusion detection. Computers & Operations Research, Vol. 32, pp. 2617–2634.
Index Terms

Computer Science
Information Sciences

Keywords

Misuse detection Anomaly detection Support Vector Machine (SVM) algorithm C4. 5 Algorithm