The prevention threat of behavior-based signature using pitcher flow architecture

In recent years, Intrusion Prevention System (IPS) has been widely implemented to prevent suspicious threats. Unlike the traditional Intrusion Detection System, IPS has additional features to secure the computer network system. IPS is an access control device with a prevention function, which enforc...

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Abdullah, Abdul Hanan, Idris, Mohd. Yazid
Format: Article
Language:English
Published: IJCSNS 2010
Subjects:
Online Access:http://eprints.utm.my/id/eprint/39151/2/20100443.pdf
http://eprints.utm.my/id/eprint/39151/
http://paper.ijcsns.org/07_book/201004/20100443.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.39151
record_format eprints
spelling my.utm.391512017-02-15T01:59:04Z http://eprints.utm.my/id/eprint/39151/ The prevention threat of behavior-based signature using pitcher flow architecture Stiawan, Deris Abdullah, Abdul Hanan Idris, Mohd. Yazid QA75 Electronic computers. Computer science In recent years, Intrusion Prevention System (IPS) has been widely implemented to prevent suspicious threats. Unlike the traditional Intrusion Detection System, IPS has additional features to secure the computer network system. IPS is an access control device with a prevention function, which enforces a network security policy, is a helpful device that allows for more granular blocking action. In this paper, we propose a new prediction and prevention method with behavior-based detection, this method is called pitcher flow. We describes the habitual activity of the performance an overall network with a new algorithm for identifying and recognizing the normal behavior of user activities in the internal network. First, we define behavior activity by duration of activity conducted and active connection. Second, we categorize packets into class/type, identifying parameters by classifying the packets. Finally, we use the pitcher flow mechanism to identify and recognize suspicious threats. This paper also describes an algorithm for the complexity of the suspicious response. IJCSNS 2010-04 Article PeerReviewed text/html en http://eprints.utm.my/id/eprint/39151/2/20100443.pdf Stiawan, Deris and Abdullah, Abdul Hanan and Idris, Mohd. Yazid (2010) The prevention threat of behavior-based signature using pitcher flow architecture. International Journal of Computer Science and Network Security, 10 (4). pp. 289-294. ISSN 1738-7906 http://paper.ijcsns.org/07_book/201004/20100443.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Stiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
The prevention threat of behavior-based signature using pitcher flow architecture
description In recent years, Intrusion Prevention System (IPS) has been widely implemented to prevent suspicious threats. Unlike the traditional Intrusion Detection System, IPS has additional features to secure the computer network system. IPS is an access control device with a prevention function, which enforces a network security policy, is a helpful device that allows for more granular blocking action. In this paper, we propose a new prediction and prevention method with behavior-based detection, this method is called pitcher flow. We describes the habitual activity of the performance an overall network with a new algorithm for identifying and recognizing the normal behavior of user activities in the internal network. First, we define behavior activity by duration of activity conducted and active connection. Second, we categorize packets into class/type, identifying parameters by classifying the packets. Finally, we use the pitcher flow mechanism to identify and recognize suspicious threats. This paper also describes an algorithm for the complexity of the suspicious response.
format Article
author Stiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
author_facet Stiawan, Deris
Abdullah, Abdul Hanan
Idris, Mohd. Yazid
author_sort Stiawan, Deris
title The prevention threat of behavior-based signature using pitcher flow architecture
title_short The prevention threat of behavior-based signature using pitcher flow architecture
title_full The prevention threat of behavior-based signature using pitcher flow architecture
title_fullStr The prevention threat of behavior-based signature using pitcher flow architecture
title_full_unstemmed The prevention threat of behavior-based signature using pitcher flow architecture
title_sort prevention threat of behavior-based signature using pitcher flow architecture
publisher IJCSNS
publishDate 2010
url http://eprints.utm.my/id/eprint/39151/2/20100443.pdf
http://eprints.utm.my/id/eprint/39151/
http://paper.ijcsns.org/07_book/201004/20100443.pdf
_version_ 1643650307870162944