Journal article Open Access

Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols

R. Kabila

JSON Export

  "files": [
      "links": {
        "self": ""
      "checksum": "md5:c381f5c5d8f6f649a8bb0e10439f594a", 
      "bucket": "b6c11c73-e0a9-4006-8222-0d63ae4f4a67", 
      "key": "14713.pdf", 
      "type": "pdf", 
      "size": 883009
  "owners": [
  "doi": "10.5281/zenodo.1083489", 
  "stats": {
    "version_unique_downloads": 42.0, 
    "unique_views": 15.0, 
    "views": 16.0, 
    "version_views": 15.0, 
    "unique_downloads": 42.0, 
    "version_unique_views": 14.0, 
    "volume": 38852396.0, 
    "version_downloads": 44.0, 
    "downloads": 44.0, 
    "version_volume": 38852396.0
  "links": {
    "doi": "", 
    "conceptdoi": "", 
    "bucket": "", 
    "conceptbadge": "", 
    "html": "", 
    "latest_html": "", 
    "badge": "", 
    "latest": ""
  "conceptdoi": "10.5281/zenodo.1083488", 
  "created": "2018-01-17T13:25:44.591933+00:00", 
  "updated": "2020-01-20T15:38:47.168285+00:00", 
  "conceptrecid": "1083488", 
  "revision": 5, 
  "id": 1083489, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.5281/zenodo.1083489", 
    "description": "IPsec has now become a standard information security\ntechnology throughout the Internet society. It provides a well-defined\narchitecture that takes into account confidentiality, authentication,\nintegrity, secure key exchange and protection mechanism against\nreplay attack also. For the connectionless security services on packet\nbasis, IETF IPsec Working Group has standardized two extension\nheaders (AH&ESP), key exchange and authentication protocols. It is\nalso working on lightweight key exchange protocol and MIB's for\nsecurity management. IPsec technology has been implemented on\nvarious platforms in IPv4 and IPv6, gradually replacing old\napplication-specific security mechanisms. IPv4 and IPv6 are not\ndirectly compatible, so programs and systems designed to one\nstandard can not communicate with those designed to the other. We\npropose the design and implementation of controlled Internet security\nsystem, which is IPsec-based Internet information security system in\nIPv4/IPv6 network and also we show the data of performance\nmeasurement. With the features like improved scalability and\nrouting, security, ease-of-configuration, and higher performance of\nIPv6, the controlled Internet security system provides consistent\nsecurity policy and integrated security management on IPsec-based\nInternet security system.", 
    "language": "eng", 
    "title": "Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols", 
    "license": {
      "id": "CC-BY-4.0"
    "relations": {
      "version": [
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "1083488"
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "1083489"
    "communities": [
        "id": "waset"
    "version": "14713", 
    "references": [
      "RFC 1933: Transition Mechanisms for IPv6 Hosts and Routers", 
      "RFC 2529: Transmission of IPv6 preko IPv4 Domains without Explicit\nTunnels", 
      "RFC 1853: IP in IP Tunneling", 
      "RFC 3056: Connection of IPv6 Domains via IPv4 Clouds", 
      "RFC 2402: IP Authentication Header (AH)", 
      "RFC 2406: IP Encapsualtion Security Payload (ESP)", 
      "RFC2460: Internet Protocol, Version 6 (IPv6) Specification", 
      "RFC 2409 The Internet Key Exchange (IKE)", 
      "RFC 2408 Internet Security Association and Key Management Protocol\n(ISAKMP).\n[10] Bill McCarty, Red Hat Linux Firewalls, Wiley Publishing, Indianapolis,\nIndiana, 2003\n[11] N. Sklavos, and O. Koufopavlou, Mobile Communications World:\nSecurity Implementations Aspects-A State of the Art, World: Security\nImplementations Aspects-A State of the Art, CSJM Journal, Institute of\nMathematics and Computer Science,\n[12] Bace, Rebecca, Intrusion Detection, Macmillan Technical Publishing,\n2000.\n[13] Bejtlich, Richard, Extrusion Detection, Addison-Wesley, 2005.\n[14] Bejtlich, Richard, The Tao of Network Security Monitoring: Beyond\nIntrusion Detection,Addison-Wesley, 2004.\n[15] Crothers, Tim, Implementing Intrusion Detection Systems: A Hands-On\nGuide for Securing the Network, 2002.\n[16] Endorf, Carl et al, Intrusion Detection and Prevention, McGraw-Hill\nOsborne Media, 2003.\n[17] Kruegel, Chris et al, Intrusion Detection and Correlation: Challenges and\nSolutions,Springer,2004.\n[18] Nazario, Jose, Defense and Detection Strategies against Internet Worms,\nArtech House Publishers, 2003.\n[19] Northcutt, Stephen and Novak, Judy, Network Intrusion Detection: An\nAnalyst-s Handbook,Third Edition, New Riders, 2003\n[20] Rash, Michael et al, Intrusion Prevention and Active Response:\nDeployment Network and Host IPS, Syngress, 2005.\n[21] K. Wang and S.J. Stolfo, \"Anomalous Payload-Based Network Intrusion\nDetection,\" Proc. Seventh Int'l Symp. Recent Advanced in Intrusion\nDetection (RAID), Sept. 2004."
    "keywords": [
    "publication_date": "2008-10-23", 
    "creators": [
        "name": "R. Kabila"
    "access_right": "open", 
    "resource_type": {
      "subtype": "article", 
      "type": "publication", 
      "title": "Journal article"
    "related_identifiers": [
        "scheme": "doi", 
        "identifier": "10.5281/zenodo.1083488", 
        "relation": "isVersionOf"
All versions This version
Views 1516
Downloads 4444
Data volume 38.9 MB38.9 MB
Unique views 1415
Unique downloads 4242


Cite as