Journal article Open Access

Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols

R. Kabila


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 1933: Transition Mechanisms for IPv6 Hosts and Routers</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 2529: Transmission of IPv6 preko IPv4 Domains without Explicit
Tunnels</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 1853: IP in IP Tunneling</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 3056: Connection of IPv6 Domains via IPv4 Clouds</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 2402: IP Authentication Header (AH)</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 2406: IP Encapsualtion Security Payload (ESP)</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC2460: Internet Protocol, Version 6 (IPv6) Specification</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 2409 The Internet Key Exchange (IKE)</subfield>
  </datafield>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">RFC 2408 Internet Security Association and Key Management Protocol
(ISAKMP).
[10] Bill McCarty, Red Hat Linux Firewalls, Wiley Publishing, Indianapolis,
Indiana, 2003
[11] N. Sklavos, and O. Koufopavlou, Mobile Communications World:
Security Implementations Aspects-A State of the Art, World: Security
Implementations Aspects-A State of the Art, CSJM Journal, Institute of
Mathematics and Computer Science,
[12] Bace, Rebecca, Intrusion Detection, Macmillan Technical Publishing,
2000.
[13] Bejtlich, Richard, Extrusion Detection, Addison-Wesley, 2005.
[14] Bejtlich, Richard, The Tao of Network Security Monitoring: Beyond
Intrusion Detection,Addison-Wesley, 2004.
[15] Crothers, Tim, Implementing Intrusion Detection Systems: A Hands-On
Guide for Securing the Network, 2002.
[16] Endorf, Carl et al, Intrusion Detection and Prevention, McGraw-Hill
Osborne Media, 2003.
[17] Kruegel, Chris et al, Intrusion Detection and Correlation: Challenges and
Solutions,Springer,2004.
[18] Nazario, Jose, Defense and Detection Strategies against Internet Worms,
Artech House Publishers, 2003.
[19] Northcutt, Stephen and Novak, Judy, Network Intrusion Detection: An
Analyst-s Handbook,Third Edition, New Riders, 2003
[20] Rash, Michael et al, Intrusion Prevention and Active Response:
Deployment Network and Host IPS, Syngress, 2005.
[21] K. Wang and S.J. Stolfo, "Anomalous Payload-Based Network Intrusion
Detection," Proc. Seventh Int'l Symp. Recent Advanced in Intrusion
Detection (RAID), Sept. 2004.</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">IDS</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">IPS</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">IP-Sec</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">IPv6</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">IPv4</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">VPN.</subfield>
  </datafield>
  <controlfield tag="005">20181206142831.0</controlfield>
  <controlfield tag="001">1083489</controlfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">883009</subfield>
    <subfield code="z">md5:c381f5c5d8f6f649a8bb0e10439f594a</subfield>
    <subfield code="u">https://zenodo.org/record/1083489/files/14713.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2008-10-23</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="p">user-waset</subfield>
    <subfield code="o">oai:zenodo.org:1083489</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">R. Kabila</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Network Based Intrusion Detection and Prevention Systems in IP-Level Security Protocols</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-waset</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">IPsec has now become a standard information security
technology throughout the Internet society. It provides a well-defined
architecture that takes into account confidentiality, authentication,
integrity, secure key exchange and protection mechanism against
replay attack also. For the connectionless security services on packet
basis, IETF IPsec Working Group has standardized two extension
headers (AH&amp;amp;ESP), key exchange and authentication protocols. It is
also working on lightweight key exchange protocol and MIB's for
security management. IPsec technology has been implemented on
various platforms in IPv4 and IPv6, gradually replacing old
application-specific security mechanisms. IPv4 and IPv6 are not
directly compatible, so programs and systems designed to one
standard can not communicate with those designed to the other. We
propose the design and implementation of controlled Internet security
system, which is IPsec-based Internet information security system in
IPv4/IPv6 network and also we show the data of performance
measurement. With the features like improved scalability and
routing, security, ease-of-configuration, and higher performance of
IPv6, the controlled Internet security system provides consistent
security policy and integrated security management on IPsec-based
Internet security system.</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.1083488</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.1083489</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
4
6
views
downloads
All versions This version
Views 44
Downloads 66
Data volume 5.3 MB5.3 MB
Unique views 44
Unique downloads 55

Share

Cite as