Comparative Study of Traditional and Next Generation IPS

  • Authors

    • Mohammed Nadir Ali
    • Madihah Mohd Saudi
    • Touhid Bhuiyan
    • Azreena Abu Bakar
    2018-10-07
    https://doi.org/10.14419/ijet.v7i4.15.21371
  • Detection, Intrusion Prevention System (IPS), Model, Next Generation Network Intrusion Prevention System (NGIPS).
  • Currently, cyber threats and attacks become a main concern among Internet users. To detect and prevent new and unknown attacks, an intelligent intrusion prevention system (IPS) which is better compared with traditional systems is needed. Furthermore, the Next Generation Intrusion Prevention System (NIGPS) is more suitable that could provide an intelligent IPS solution for new and unknown attacks. Therefore, this paper presents the limitation of traditional IPS systems, a comparison between IPS and NIGPS and proposes an enhanced model for NIGPS.

     

     

  • References

    1. [1] Pirc, J. (2015). Next generation intrusion prevention is… So yesterday. White Paper. http://www.bricata.com.

      [2] Bace, R. (1998). An introduction to intrusion detection and assessment. Infidel Inc.

      [3] Woznick, D. (2014). Global information assurance certification paper. https://www.giac.org/paper/gcfw/441/giac-gcfw-assignment-pass/105451.

      [4] Stiawan, D., Abdullah, A. H. & Idris, M. Y. (2011). Characterizing network intrusion prevention system. International Journal of Computer Application, 14(1), 11-18.

      [5] Catherine, P. (2009). Network security using Cisco IOS IPS. Cisco Press.

      [6] Ghorbani, A. A., Lu, W. & Tavallee, M. (2009). Network intrusion detection and prevention: Concepts and technique. Springer.

      [7] Sekhar, R., Perumal, D. & Rani, S. (2015). Analysis of next generation intrusion prevention system using sensor fusion and fuzzy logic. International Journal of Scientific Research Engineering and Technology, 4(9), 936-938.

      [8] Cisco. (2016). Cisco secure IPS - Excluding false positive alarms. https://www.cisco.com/c/en/us/support/docs/security/ips-4200-series-sensors/13876-f-pos.html#backinfo.

      [9] Venter, H.S & Eloff, J.H.P. (2003). A taxonomy for information security technologies. Computers and Security, 22(4), 299-307.

      [10] Zhang, S., Li, J., Chen, X. & Fan, L. (2008). Building network attack graph for alert causal correlation. Computers and Security, 27(5-6), 188-196.

      [11] Kukielka, P., & Kotulski, Z. (2010). Adaptation of the neural network-based IDS to new attacks detection. https://arxiv.org/ftp/arxiv/papers/1009/1009.2406.pdf.

      [12] Stiawan, D., Abdullah, A. H. & Idris, M. Y. (2010). Classification of habitual activities in behavior-based net-work detection. Journal of Computing, 2, 1-7.

  • Downloads

  • How to Cite

    Nadir Ali, M., Mohd Saudi, M., Bhuiyan, T., & Abu Bakar, A. (2018). Comparative Study of Traditional and Next Generation IPS. International Journal of Engineering & Technology, 7(4.15), 55-58. https://doi.org/10.14419/ijet.v7i4.15.21371