Journal article Open Access

Network Based Intrusion Detection System using Protocol Standardization Techniques

D. Parameswari; V. Khanaa


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/10b58e56-9e26-403d-b23b-4d68b28b80d6/B3351129219.pdf"
      }, 
      "checksum": "md5:e2a3c0d3cd88dfa511d4f5112d01a5f0", 
      "bucket": "10b58e56-9e26-403d-b23b-4d68b28b80d6", 
      "key": "B3351129219.pdf", 
      "type": "pdf", 
      "size": 475256
    }
  ], 
  "owners": [
    251627
  ], 
  "doi": "10.35940/ijeat.B3351.129219", 
  "stats": {
    "version_unique_downloads": 14.0, 
    "unique_views": 12.0, 
    "views": 15.0, 
    "version_views": 15.0, 
    "unique_downloads": 14.0, 
    "version_unique_views": 12.0, 
    "volume": 6653584.0, 
    "version_downloads": 14.0, 
    "downloads": 14.0, 
    "version_volume": 6653584.0
  }, 
  "links": {
    "doi": "https://doi.org/10.35940/ijeat.B3351.129219", 
    "latest_html": "https://zenodo.org/record/5598468", 
    "bucket": "https://zenodo.org/api/files/10b58e56-9e26-403d-b23b-4d68b28b80d6", 
    "badge": "https://zenodo.org/badge/doi/10.35940/ijeat.B3351.129219.svg", 
    "html": "https://zenodo.org/record/5598468", 
    "latest": "https://zenodo.org/api/records/5598468"
  }, 
  "created": "2021-10-26T04:19:40.472267+00:00", 
  "updated": "2021-10-26T13:48:45.753128+00:00", 
  "conceptrecid": "5598467", 
  "revision": 2, 
  "id": 5598468, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.35940/ijeat.B3351.129219", 
    "description": "<p>The IDS system identifies the anomaly device which connected in the network communication process through evaluating the MAC address compared with the registered list of devices. In completion, this research work ensures that all the devices which are involved in the network communications are authenticated and secured, which increases the security of the network and prevents the intruder. This research work attempts to increase the quality of service of network communication, ensuring error-free communication through monitoring the network.</p>", 
    "contributors": [
      {
        "affiliation": "Publisher", 
        "type": "Sponsor", 
        "name": "Blue Eyes Intelligence Engineering  & Sciences Publication (BEIESP)"
      }
    ], 
    "title": "Network Based Intrusion Detection System using  Protocol Standardization Techniques", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "journal": {
      "volume": "9", 
      "issue": "2", 
      "pages": "191-194", 
      "title": "International Journal of Engineering and Advanced Technology (IJEAT)"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "5598467"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "5598468"
          }
        }
      ]
    }, 
    "language": "eng", 
    "subjects": [
      {
        "term": "ISSN", 
        "scheme": "issn", 
        "identifier": "2249-8958"
      }, 
      {
        "term": "Retrieval Number", 
        "scheme": "handle", 
        "identifier": "B3351129219/2019\u00a9BEIESP"
      }
    ], 
    "keywords": [
      "IDS, ICMP, MAC"
    ], 
    "publication_date": "2019-12-30", 
    "creators": [
      {
        "affiliation": "Research Scholar Department of Computer Science  and Engineering Bharath Institute of Higher Education and Research,  Chennai-600073,India,", 
        "name": "D. Parameswari"
      }, 
      {
        "affiliation": "Department of IT Bharath Institute of  Higher Education and Research Chennai-600073,India,", 
        "name": "V. Khanaa"
      }
    ], 
    "access_right": "open", 
    "resource_type": {
      "subtype": "article", 
      "type": "publication", 
      "title": "Journal article"
    }, 
    "related_identifiers": [
      {
        "scheme": "issn", 
        "identifier": "2249-8958", 
        "relation": "isCitedBy", 
        "resource_type": "publication-article"
      }
    ]
  }
}
15
14
views
downloads
Views 15
Downloads 14
Data volume 6.7 MB
Unique views 12
Unique downloads 14

Share

Cite as