Call for Papers 2022

Feb 2023 - Volume 14, Issue 1
Deadline: 15 Jan 2023
Publication: 20 Feb 2023

Apr 2023 - Volume 14, Issue 2
Deadline: 15 Mar 2023
Publication: 20 Apr 2023


Indexed in

IJCSE Indexed in Scopus


Title : Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method
Keywords : IIDPS using OODA; Intelligence Intrusion Detection Prevention ; Unknown Malware attack Prevention by using OODA.
Issue Date : December 2010
Abstract :
This paper is deliberate to provide a model for “Intelligence Intrusion Detection Prevention Systems using Object Oriented Analysis method ” , It describes the state’s overall requirements regarding the acquisition and implementation of intrusion prevention and detection systems with intelligence (IIPS/IIDS). This is designed to provide a deeper understanding of intrusion prevention and detection principles with intelligence may be responsible for acquiring, implementing or monitoring such systems in understanding the technology and strategies available. With the need for evolution, if not revolution, of current network architectures and the Internet, autonomous and spontaneous management will be a key feature of future networks and information systems. In this context, security is an essential property. It must be thought at the early stage of conception of these systems and designed to be also autonomous and spontaneous. Future networks and systems must be able to automatically configure themselves with respect to their security policies. The security policy specification must be dynamic and adapt itself to the changing environment. Those networks and systems should interoperate securely when their respective security policies are heterogeneous and possibly conflicting. They must be able to autonomously evaluate the impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given intrusion is detected. Autonomous and spontaneous security is a major requirement of future networks and systems. Of course, it is crucial to address this issue in different wireless and mobile technologies available today such as RFID,Wifi, Wimax, 3G, etc. Other technologies such as ad hoc and sensor networks, which introduce new type of services, also share similar requirements for an autonomous and spontaneous management of security. Intelligence Intrusion Prevention Systems (IIPS) are designed to aid in preventing the compromise of information systems and thus help preserve the basic triad of all security, confidentiality, Integrity and availability (CIA), not only of information but the infrastructures that store and transmit it as well. Intelligence Intrusion detection systems (IDS) refer to any technology or strategy that allows us to detect the attempted compromise of our systems and information, and as before, preserve the CIA of the information and infrastructures. In many cases these two systems work together and with the networking infrastructure to do their jobs. As IIPS/IIDS technology has improved over the last few years, prevention and detection have been consolidated into one network device, or as it is commonly referred to, one “appliance.” In other cases the IPS is a separate technology, usually a software package or “agent” that runs on a desktop or host to detect attempted compromise.
Page(s) : 372-381
ISSN : 0976-5166
Source : Vol. 1, No.4