Journal article Open Access

Network Based Intrusion Detection System using Protocol Standardization Techniques

D. Parameswari; V. Khanaa


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://zenodo.org/record/5598468</identifier>
  <creators>
    <creator>
      <creatorName>D. Parameswari</creatorName>
      <affiliation>Research Scholar Department of Computer Science  and Engineering Bharath Institute of Higher Education and Research,  Chennai-600073,India,</affiliation>
    </creator>
    <creator>
      <creatorName>V. Khanaa</creatorName>
      <affiliation>Department of IT Bharath Institute of  Higher Education and Research Chennai-600073,India,</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Network Based Intrusion Detection System using  Protocol Standardization Techniques</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2019</publicationYear>
  <subjects>
    <subject>IDS, ICMP, MAC</subject>
    <subject subjectScheme="issn">2249-8958</subject>
    <subject subjectScheme="handle">B3351129219/2019©BEIESP</subject>
  </subjects>
  <contributors>
    <contributor contributorType="Sponsor">
      <contributorName>Blue Eyes Intelligence Engineering  &amp; Sciences Publication (BEIESP)</contributorName>
      <affiliation>Publisher</affiliation>
    </contributor>
  </contributors>
  <dates>
    <date dateType="Issued">2019-12-30</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="JournalArticle"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5598468</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2249-8958</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijeat.B3351.129219</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;The IDS system identifies the anomaly device which connected in the network communication process through evaluating the MAC address compared with the registered list of devices. In completion, this research work ensures that all the devices which are involved in the network communications are authenticated and secured, which increases the security of the network and prevents the intruder. This research work attempts to increase the quality of service of network communication, ensuring error-free communication through monitoring the network.&lt;/p&gt;</description>
  </descriptions>
</resource>
15
14
views
downloads
Views 15
Downloads 14
Data volume 6.7 MB
Unique views 12
Unique downloads 14

Share

Cite as