Skip to main content

LAN Security Management System

  • Conference paper
  • First Online:
Computing and Network Sustainability

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 75))

  • 635 Accesses

Abstract

In today’s competitive era, the success of an organization solely depends on its protection of resources involved in computing. Intrusions are silent enemies that can strike any organization without warning. While these threats can go unnoticed until they cause operational disasters, there is no single “silver bullet” cure for organizational security threats. There are numerous intrusion detection systems (IDS) that work at network level which could not trace all the intrusions. So, it is required to develop integrated IDS which works at both host level and network level and reacts proactively to the threats. To develop an effective network security system for LAN includes the following components.

  • To develop a network management system (NMS) which analyzes the traffic and throughput, predicts the link failure and monitors the availability of the device.

  • To develop a hybrid intrusion detection system (IDS) which identifies the known and unknown malicious activities (Signature and Anomaly) and alarms the administrator.

  • To perform port scanning which scans the activities of network devices (routes, switches, and host computer services) and report abnormal services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jian Y (2009) An improved intrusion detection algorithm based on DBSCAN. Micro Comput Inf 25:1008–0570(2009)01-3-0058-03, 58-60

    Google Scholar 

  2. Yu S, Guo S, Stojmenovic I (2015) Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Tran Comput 64(1): 139–151

    Article  MathSciNet  Google Scholar 

  3. Shue CA, Kalafut AJ, Gupta M (2012) Abnormally malicious autonomous systems and their internet connectivity. IEEE/ACM Trans. Netw 20(1): 220–230

    Article  Google Scholar 

  4. Zeng Y, Hu X, Shin KG (2010) Detection of Botnets using combined host- and network-level information. In: IEEE international symposium on network computing and applications. NCA, 2010, pp. 148–152

    Google Scholar 

  5. Li L, Yang DZ, Shen FC (2010) A novel rule-based intrusion detection system using data mining. In ICCSIT, IEEE international conference

    Google Scholar 

  6. L. Dongxia, Z. Yongbo (2012) An intrusion detection system based on honeypot technology. In: 2012 international conference on IEEE computer science and electronics engineering (ICCSEE), vol 1

    Google Scholar 

  7. Chandrasekhar AM, Raghuveer K (2013) Intrusion detection technique by using K-means, fuzzy neural network and SVM classifiers. In: ICCCI, 2013

    Google Scholar 

  8. Aydin et al (2009) A hybrid intrusion detection system design for computer network security. Comput Electr Eng 35:517–526

    Google Scholar 

  9. Huang W et al (2010) A multi-agent-based distributed intrusion detection System. In: 2010 3rd international conference on advanced computer theory and engineering (ICACTE)

    Google Scholar 

  10. Xue Q et al (2003) The design of a distributed network intrusion detection system IA-NIDS. In: Proceedings of the second international conference on machine learning and cybernetics, 2–5 Nov 2003

    Google Scholar 

  11. Chen YM, Yang Y (2004) Policy management for network-based intrusion detection and prevention. In: IEEE NOMS 2004, Seoul

    Google Scholar 

  12. Khan NY et al (2010) Comparative study of intrusion detection system and its recovery mechanism. IEEE, 2010

    Google Scholar 

  13. PAN Z et al (2005) An integrated model of intrusion detection based on neural network and expert system. In: Proceedings of the 17th IEEE international conference on tools with artificial intelligence (ICTAI’05)

    Google Scholar 

  14. Kim G et al (2014) A novel hybrid intrusion detection method integrating anomaly detection with misuse detection. Expert Syst Appl 41:1690–1700

    Article  Google Scholar 

  15. SanieeAbadeh M et al (2011) Design and analysis of genetic fuzzy systems for intrusion detection in computer networks. Expert Syst Appl 38:7067–7075

    Article  Google Scholar 

  16. Hubballi N et al (2011) LAN attack detection using discrete event systems. ISA Trans 50:119–130

    Article  Google Scholar 

  17. Elhag S et al (2015) On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems. Expert Syst Appl 42:193–202

    Article  Google Scholar 

  18. Rama Krishna V, Subhashini R (2018) BOTNET algorithm adoptabulity for mimicking attack and inducing mimicking attack. J Adv Res Dyn Control Syst 06:977–991

    Google Scholar 

  19. Rama Krishna V, Subhashini R Detecting HTTP based mimicking attacks at HTTP server. Int J Eng Technol 0975–4024

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Rama Krishna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Krishna, V.R., Subhasini, R. (2019). LAN Security Management System. In: Peng, SL., Dey, N., Bundele, M. (eds) Computing and Network Sustainability. Lecture Notes in Networks and Systems, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-13-7150-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-7150-9_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-7149-3

  • Online ISBN: 978-981-13-7150-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics