An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment

K. Prabu, P. Sudhakar
{"title":"An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment","authors":"K. Prabu, P. Sudhakar","doi":"10.22247/ijcna/2023/223316","DOIUrl":null,"url":null,"abstract":"– Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real-time data analysis, promptly identifies and responds to potential security breaches. It gathers security data from multiple sources, such as network traffic, system logs, user behaviour, and external threat intelligence feeds, enhancing overall cybersecurity defenses. The increasing volume of data sharing and network traffic has raised concerns about cybersecurity. To address this issue, we propose the Automatic Intrusion Detection System (AiDS) is defined as monitoring the network for suspicious activity for managing network traffic. The activities detected are monitored based on the alerts, and the operation centres are analyzed using the appropriate actions to remediate the threat. The Automatic intrusion Detection System and the Intrusion Prevention System (IPS) have been used to prevent and secure network data. By using the technique of Automatic intrusion Detection System (AiDS), the identification of the endpoint protection, which is related to the hunting engine, risk management, incident response mobile security, and access management and by using the technique of Intrusion Prevention System (AiPS) the vulnerability of threat management and the analysis of the data in the network is proposed. The result describes the 97.2% of data in the KDD 99 data set, the accuracy and sensitivity of the data from the network is 92.8%, and the system's formation. The approximate data in the database is 75%. The security services' intrusion and the system's data formation in the digital threat data have been accessed successfully","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2023/223316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1

Abstract

– Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real-time data analysis, promptly identifies and responds to potential security breaches. It gathers security data from multiple sources, such as network traffic, system logs, user behaviour, and external threat intelligence feeds, enhancing overall cybersecurity defenses. The increasing volume of data sharing and network traffic has raised concerns about cybersecurity. To address this issue, we propose the Automatic Intrusion Detection System (AiDS) is defined as monitoring the network for suspicious activity for managing network traffic. The activities detected are monitored based on the alerts, and the operation centres are analyzed using the appropriate actions to remediate the threat. The Automatic intrusion Detection System and the Intrusion Prevention System (IPS) have been used to prevent and secure network data. By using the technique of Automatic intrusion Detection System (AiDS), the identification of the endpoint protection, which is related to the hunting engine, risk management, incident response mobile security, and access management and by using the technique of Intrusion Prevention System (AiPS) the vulnerability of threat management and the analysis of the data in the network is proposed. The result describes the 97.2% of data in the KDD 99 data set, the accuracy and sensitivity of the data from the network is 92.8%, and the system's formation. The approximate data in the database is 75%. The security services' intrusion and the system's data formation in the digital threat data have been accessed successfully
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种用于增强网络安全和威胁评估的自动入侵检测和防御模型
–在网络威胁和安全漏洞激增的情况下,我们引入了自动入侵检测和预防模型,以支持威胁评估和安全数据解决方案。我们的模型利用最先进的自动入侵检测系统(AIDS)和实时数据分析,能够及时识别和应对潜在的安全漏洞。它从多个来源收集安全数据,如网络流量、系统日志、用户行为和外部威胁情报,增强了整体网络安全防御。数据共享和网络流量的不断增加引发了人们对网络安全的担忧。为了解决这个问题,我们提出将自动入侵检测系统(AiDS)定义为监控网络中的可疑活动,以管理网络流量。根据警报监测检测到的活动,并使用适当的措施对运营中心进行分析,以补救威胁。自动入侵检测系统和入侵防御系统(IPS)已被用于防止和保护网络数据。利用自动入侵检测系统(AiDS)技术,识别了与搜索引擎、风险管理、事件响应移动安全和访问管理相关的端点保护,并利用入侵防御系统(AiPS)技术,提出了威胁管理的漏洞和网络中数据的分析。结果描述了KDD99数据集中97.2%的数据,网络数据的准确性和敏感性为92.8%,以及系统的形成。数据库中的近似数据为75%。安全服务的入侵和系统在数字威胁数据中的数据形成已成功访问
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Computer Networks and Applications
International Journal of Computer Networks and Applications Computer Science-Computer Science Applications
CiteScore
2.30
自引率
0.00%
发文量
40
期刊最新文献
Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On-Demand Distance Vector Routing Protocol in MANETs Resilient Artificial Bee Colony Optimized AODV Routing Protocol (RABCO-AODV-RP) for Minimizing the Energy Consumption in Flying Ad-Hoc Network TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol Expedient Intrusion Detection System in MANET Using Robust Dragonfly-Optimized Enhanced Naive Bayes (RDO-ENB) Vehicular Ad Hoc Networks Assisted Clustering Nodular Framework for Optimal Packet Routing and Scaling
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1