CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:IDDP: Novel Development of an Intrusion Detection System through Design Patterns

by Rajshekhar M Patil, Mamithar. R. Patil, Dr. K V. Ramakrishnan, Dr. T.C.Manjunath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 12
Year of Publication: 2010
Authors: Rajshekhar M Patil, Mamithar. R. Patil, Dr. K V. Ramakrishnan, Dr. T.C.Manjunath
10.5120/1299-1601

Rajshekhar M Patil, Mamithar. R. Patil, Dr. K V. Ramakrishnan, Dr. T.C.Manjunath . Article:IDDP: Novel Development of an Intrusion Detection System through Design Patterns. International Journal of Computer Applications. 7, 12 ( October 2010), 22-29. DOI=10.5120/1299-1601

@article{ 10.5120/1299-1601,
author = { Rajshekhar M Patil, Mamithar. R. Patil, Dr. K V. Ramakrishnan, Dr. T.C.Manjunath },
title = { Article:IDDP: Novel Development of an Intrusion Detection System through Design Patterns },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 12 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number12/1299-1601/ },
doi = { 10.5120/1299-1601 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:07.597807+05:30
%A Rajshekhar M Patil
%A Mamithar. R. Patil
%A Dr. K V. Ramakrishnan
%A Dr. T.C.Manjunath
%T Article:IDDP: Novel Development of an Intrusion Detection System through Design Patterns
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 12
%P 22-29
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A novel method of design & development of an intrusion development system through design patterns is presented in this paper. Large scale use of computers and networking in various day to day businesses and individual communication applications has given rise to security issues. The process of monitoring the events occurring in a computer network and analyzing them for any sign of intrusion is known as IDS. Design pattern is a metric that measures how much of an object oriented design can be understood and represented as IDS. This paper presents a quantifiable and observable definition of metric for IDS. The IDS through design pattern is easier to implement compared to techniques like IDDM and IDS through UNIX system calls. The quantitative results shown in this paper projects the effectiveness of the proposed method that can be widely used in security systems.

References
  1. Dorothy Denning “An intrusion detection model” IEEE Trans. on software engineering, No. 2, pp. 272-280, Feb 1987.
  2. J M Bradshaw, “An introduction to software agents” in software agents, Bradshaw J M (ED), Cambridge M A : MIT press, 1997.
  3. Kent Beek and Erich Gamma Junit: A cook’s tour available from http:// Junit://Junit.source .net/doc/cook’stour/cookstour.html.
  4. Fayyad.U.Piatesky-Shapiro, G and Smyth . P.1996 The KDD process of extracting useful knowledge from volumes of data communication ACM 39,11, 27-34.
  5. Dirk Riechale et. al. “Design pattern validated”.
  6. Rajashekaran.S: efficient parallel hierarchical clustering algorithms . IEEE Trans. in parallel and distributed systems 16(6), 497-502 (2005).
  7. Dirk Rachele, Roger Bradman,Thomas Gross and matzel “pattern density and role modeling of an object transport service” ACM Computing surveys 32(Mar. 2000), No. 10.
  8. James O coplin Advanced C++ programming styles and idioms.Addison Wesley, 1991.
  9. Helmer G. S K Wang “Host based IDS” lowa state university International conference on applications” Maths (Jul. 2002) 4 97 – 501.
  10. Erich Gamma, Richord helm, Ralph Johnson .Design patterns: Elements of reusable object oriented software, Addison Wesley – 1995.
  11. Paul Dokas ,Vipin kumar “network Intrusion Detection",200 UNION STREET SE 192,CSE building UOM,MINNEPOLIS, MN 55455 U S
  12. Dirk Rachele junit 3.8 documented using collaborations. In S E notes, Vol. 33, No. 2, Art. 5, Mar. 2008, ACM 2008.
  13. SNORT Intrusion Detection System.www.snort.org.
  14. TCP TRACE software tool,www.tcptrace.org.
  15. P C Mahalanobis, on tests and measures of groups Divergence ,IJNS of Bengal,1930.
  16. J Mc Hugh,1998 Lincoln laboratory IDS evaluation (A critique),proceedings of the recent advances in intrusions detection system 145 – 161, France 2000.
  17. Li X: Parallel algorithms for hierarchical clustering and clustering validity. IEEE trans, pattern analysis and machine intelligence,12,1088 – 1092(1990).
  18. R K Cunnigham ,R P Lippman , results of the 1999 darpa off line IDS ,RAID- 99 IN 1999.
  19. Iftikhar Ahmad, Azween B Abdulah and Abdullah S Alghamdi, “Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks”, Advances in Computer Science and Information Technology, Lecture Notes in Computer Science, Volume 6059, 2010, 597-602, DOI: 10.1007/978-3-642-13577-4_53.
  20. Byung-kwan Lee, Seung-hae Yang, Dong-Hyuck Kwon and Dai-Youn Kim, “PGNIDS”, Computational Science and Its Applications - ICCSA 2006, LNCS, 2006, Volume 3982 / 2006, pp. 38-47, DOI: 10.1007/11751595_5
  21. J., Muna. M. and Mehrotra M., "Intrusion Detection System : A design perspective", 2rd Int.Conf. On Data Management, IMT Ghaziabad, India. 2009.
  22. M. Panda, and M. Patra, “Building an efficient network intrusion detection model using Self Organizing Maps", proceeding of world academy of science, engineering and technology,Vol. 38. 2009.
  23. M. Khattab Ali, W. Venus, and M. Suleiman Al Rababaa, "The Affect of Fuzzification on Neural Networks Intrusion Detection System", IEEE computer society.2009.
  24. B. Mykerjee, L. Heberlein T., and K. Levitt N., "Network Intrusion Detection", IEEE Networks, Vol. 8, No.3, PP.14-26. 1994.
  25. W. Jung K., "Integration Artificial Immune Algorithms for Intrusion Detection", dissertation in University of London, pp. 1-5.2002.
  26. Muna Mhammad T. Jawhar & Monica Mehrotra, “Design Network Intrusion Detection System using hybrid Fuzzy-Neural Network International” Journal of Computer Science and Security, Int. J. of Comp. Sci. and Security, Volume (4), Issue (3) pp. 285-294, 2010.
  27. Vokorokos, L. Balaz, A., “Host-based intrusion detection system”, Technical University of KoÂice, 14th Int. Conf. on Intelligent Engg. Systems (INES-2010), Las Palmas, Spain, pp. 43 – 47, 5-7 May 2010.
  28. http://www.windowsecurity.com/articles/What_You_Need_to_Know_About_Intrusion_Detection_Systems.html
  29. Robert J. Shimonski, “Security+ Study Guide and DVD Training System”, Published: Nov 18, 2002, Updated: Jul 23, 2004.
  30. Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, ature deduction and ensemble design of intrusion detection systems”, Journal of Computers & Security, Volume 24, Issue 4, pp. 295-30, June 2005.
Index Terms

Computer Science
Information Sciences

Keywords

IDS - Intrusion Detection System FP-Functional Points IDDM - Intrusion Detection in Data Mining