{"title":"An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment","authors":"K. Prabu, P. Sudhakar","doi":"10.22247/ijcna/2023/223316","DOIUrl":null,"url":null,"abstract":"– Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real-time data analysis, promptly identifies and responds to potential security breaches. It gathers security data from multiple sources, such as network traffic, system logs, user behaviour, and external threat intelligence feeds, enhancing overall cybersecurity defenses. The increasing volume of data sharing and network traffic has raised concerns about cybersecurity. To address this issue, we propose the Automatic Intrusion Detection System (AiDS) is defined as monitoring the network for suspicious activity for managing network traffic. The activities detected are monitored based on the alerts, and the operation centres are analyzed using the appropriate actions to remediate the threat. The Automatic intrusion Detection System and the Intrusion Prevention System (IPS) have been used to prevent and secure network data. By using the technique of Automatic intrusion Detection System (AiDS), the identification of the endpoint protection, which is related to the hunting engine, risk management, incident response mobile security, and access management and by using the technique of Intrusion Prevention System (AiPS) the vulnerability of threat management and the analysis of the data in the network is proposed. The result describes the 97.2% of data in the KDD 99 data set, the accuracy and sensitivity of the data from the network is 92.8%, and the system's formation. The approximate data in the database is 75%. The security services' intrusion and the system's data formation in the digital threat data have been accessed successfully","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22247/ijcna/2023/223316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 1
Abstract
– Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real-time data analysis, promptly identifies and responds to potential security breaches. It gathers security data from multiple sources, such as network traffic, system logs, user behaviour, and external threat intelligence feeds, enhancing overall cybersecurity defenses. The increasing volume of data sharing and network traffic has raised concerns about cybersecurity. To address this issue, we propose the Automatic Intrusion Detection System (AiDS) is defined as monitoring the network for suspicious activity for managing network traffic. The activities detected are monitored based on the alerts, and the operation centres are analyzed using the appropriate actions to remediate the threat. The Automatic intrusion Detection System and the Intrusion Prevention System (IPS) have been used to prevent and secure network data. By using the technique of Automatic intrusion Detection System (AiDS), the identification of the endpoint protection, which is related to the hunting engine, risk management, incident response mobile security, and access management and by using the technique of Intrusion Prevention System (AiPS) the vulnerability of threat management and the analysis of the data in the network is proposed. The result describes the 97.2% of data in the KDD 99 data set, the accuracy and sensitivity of the data from the network is 92.8%, and the system's formation. The approximate data in the database is 75%. The security services' intrusion and the system's data formation in the digital threat data have been accessed successfully