arrow
Volume 13, Issue 2
An Improved Network-based Intrusion Detection System for Virtual Private Networks

S V Athawale and M A Pund

J. Info. Comput. Sci. , 13 (2018), pp. 151-154.

Export citation
  • Abstract
(Received March 06 2017, accepted February 11 2018) Abstract Use of internet increases day by day so securing network and data is big issue. So, it is very important to maintain security to ensure safe and trusted communication of information between different organizations. Because of these IDS is very useful component of computer and network security. IDS system is used by many organizations or industries to detect the weakness in their security, documenting previous attacks and threats and preventing all of this from violating security policies .Because of these advantages this system is important in system security. In this paper we find the solution for different approaches (attacks) based on intrusion detection system. In this paper we identify different attacks and find solution for different type of attacks such as DDOS, SQL injection and brute force attack. In this case we use client server architecture. To implement this we maintain profile of user and base on this we find normal user or attacker ,when system find that attack is present then it directly block the attack.
  • AMS Subject Headings

  • Copyright

COPYRIGHT: © Global Science Press

  • Email address
  • BibTex
  • RIS
  • TXT
@Article{JICS-13-151, author = {S V Athawale and M A Pund}, title = {An Improved Network-based Intrusion Detection System for Virtual Private Networks}, journal = {Journal of Information and Computing Science}, year = {2024}, volume = {13}, number = {2}, pages = {151--154}, abstract = {(Received March 06 2017, accepted February 11 2018) Abstract Use of internet increases day by day so securing network and data is big issue. So, it is very important to maintain security to ensure safe and trusted communication of information between different organizations. Because of these IDS is very useful component of computer and network security. IDS system is used by many organizations or industries to detect the weakness in their security, documenting previous attacks and threats and preventing all of this from violating security policies .Because of these advantages this system is important in system security. In this paper we find the solution for different approaches (attacks) based on intrusion detection system. In this paper we identify different attacks and find solution for different type of attacks such as DDOS, SQL injection and brute force attack. In this case we use client server architecture. To implement this we maintain profile of user and base on this we find normal user or attacker ,when system find that attack is present then it directly block the attack. }, issn = {1746-7659}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22457.html} }
TY - JOUR T1 - An Improved Network-based Intrusion Detection System for Virtual Private Networks AU - S V Athawale and M A Pund JO - Journal of Information and Computing Science VL - 2 SP - 151 EP - 154 PY - 2024 DA - 2024/01 SN - 13 DO - http://doi.org/ UR - https://global-sci.org/intro/article_detail/jics/22457.html KW - DDos, SQL injection, Brute force, CFG, Scenario Attack Graph, Nice Agent AB - (Received March 06 2017, accepted February 11 2018) Abstract Use of internet increases day by day so securing network and data is big issue. So, it is very important to maintain security to ensure safe and trusted communication of information between different organizations. Because of these IDS is very useful component of computer and network security. IDS system is used by many organizations or industries to detect the weakness in their security, documenting previous attacks and threats and preventing all of this from violating security policies .Because of these advantages this system is important in system security. In this paper we find the solution for different approaches (attacks) based on intrusion detection system. In this paper we identify different attacks and find solution for different type of attacks such as DDOS, SQL injection and brute force attack. In this case we use client server architecture. To implement this we maintain profile of user and base on this we find normal user or attacker ,when system find that attack is present then it directly block the attack.
S V Athawale and M A Pund. (2024). An Improved Network-based Intrusion Detection System for Virtual Private Networks. Journal of Information and Computing Science. 13 (2). 151-154. doi:
Copy to clipboard
The citation has been copied to your clipboard