Abstract
In today’s competitive era, the success of an organization solely depends on its protection of resources involved in computing. Intrusions are silent enemies that can strike any organization without warning. While these threats can go unnoticed until they cause operational disasters, there is no single “silver bullet” cure for organizational security threats. There are numerous intrusion detection systems (IDS) that work at network level which could not trace all the intrusions. So, it is required to develop integrated IDS which works at both host level and network level and reacts proactively to the threats. To develop an effective network security system for LAN includes the following components.
-
To develop a network management system (NMS) which analyzes the traffic and throughput, predicts the link failure and monitors the availability of the device.
-
To develop a hybrid intrusion detection system (IDS) which identifies the known and unknown malicious activities (Signature and Anomaly) and alarms the administrator.
-
To perform port scanning which scans the activities of network devices (routes, switches, and host computer services) and report abnormal services.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jian Y (2009) An improved intrusion detection algorithm based on DBSCAN. Micro Comput Inf 25:1008–0570(2009)01-3-0058-03, 58-60
Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Tran Comput 64(1): 139–151
Shue CA, Kalafut AJ, Gupta M (2012) Abnormally malicious autonomous systems and their internet connectivity. IEEE/ACM Trans. Netw 20(1): 220–230
Zeng Y, Hu X, Shin KG (2010) Detection of Botnets using combined host- and network-level information. In: IEEE international symposium on network computing and applications. NCA, 2010, pp. 148–152
Li L, Yang DZ, Shen FC (2010) A novel rule-based intrusion detection system using data mining. In ICCSIT, IEEE international conference
L. Dongxia, Z. Yongbo (2012) An intrusion detection system based on honeypot technology. In: 2012 international conference on IEEE computer science and electronics engineering (ICCSEE), vol 1
Chandrasekhar AM, Raghuveer K (2013) Intrusion detection technique by using K-means, fuzzy neural network and SVM classifiers. In: ICCCI, 2013
Aydin et al (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35:517–526
Huang W et al (2010) A multi-agent-based distributed intrusion detection System. In: 2010 3rd international conference on advanced computer theory and engineering (ICACTE)
Xue Q et al (2003) The design of a distributed network intrusion detection system IA-NIDS. In: Proceedings of the second international conference on machine learning and cybernetics, 2–5 Nov 2003
Chen YM, Yang Y (2004) Policy management for network-based intrusion detection and prevention. In: IEEE NOMS 2004, Seoul
Khan NY et al (2010) Comparative study of intrusion detection system and its recovery mechanism. IEEE, 2010
PAN Z et al (2005) An integrated model of intrusion detection based on neural network and expert system. In: Proceedings of the 17th IEEE international conference on tools with artificial intelligence (ICTAI’05)
Kim G et al (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41:1690–1700
SanieeAbadeh M et al (2011) Design and analysis of genetic fuzzy systems for intrusion detection in computer networks. Expert Syst Appl 38:7067–7075
Hubballi N et al (2011) LAN attack detection using discrete event systems. ISA Trans 50:119–130
Elhag S et al (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42:193–202
Rama Krishna V, Subhashini R (2018) BOTNET algorithm adoptabulity for mimicking attack and inducing mimicking attack. J Adv Res Dyn Control Syst 06:977–991
Rama Krishna V, Subhashini R Detecting HTTP based mimicking attacks at HTTP server. Int J Eng Technol 0975–4024
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Krishna, V.R., Subhasini, R. (2019). LAN Security Management System. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_47
Download citation
DOI: https://doi.org/10.1007/978-981-13-7150-9_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7149-3
Online ISBN: 978-981-13-7150-9
eBook Packages: EngineeringEngineering (R0)