IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cross-Layer Based Intrusion Detection and Prevention for Network

Cross-Layer Based Intrusion Detection and Prevention for Network
View Sample PDF
Author(s): Reema Kumari (Galgotias University, India)and Kavita Sharma (National Institute of Technology Kurukshetra, India)
Copyright: 2018
Pages: 19
Source title: Handbook of Research on Network Forensics and Analysis Techniques
Source Author(s)/Editor(s): Gulshan Shrivastava (National Institute of Technology Patna, India), Prabhat Kumar (National Institute of Technology Patna, India), B. B. Gupta (National Institute of Technology Kurukshetra, India), Suman Bala (Orange Labs, France)and Nilanjan Dey (Department of Information Technology, Techno India College of Technology, Kolkata, India)
DOI: 10.4018/978-1-5225-4100-4.ch003

Purchase

View Cross-Layer Based Intrusion Detection and Prevention for Network on the publisher's website for pricing and purchasing information.

Abstract

Day by day technologies for mobile computing growing rapidly and its network security changed according to their need. The attacker always trying to learn some new techniques to break those security walls of the wireless network. To prevent our network from attacker various defense techniques are used. Firewalls and encryption are used to prevent our network from malware but it is not sufficient for protecting the networks. Many researchers implement new architecture and techniques or mechanism that protect and detect malicious node and their activity over the network that is intrusion detection system (IDS). IDS provides security wall and it provides network security as well as it has continuously monitored and taken appropriate action against the threat. In this Chapter, we are trying to explain some network attack that is resolved or detect through intrusion detection system by exploiting the technology or information that available across different layers of the protocol stack in order to improve the accuracy of detection.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom