Comparative Study of Traditional and Next Generation IPS

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Currently, cyber threats and attacks become a main concern among Internet users. To detect and prevent new and unknown attacks, an intelligent intrusion prevention system (IPS) which is better compared with traditional systems is needed. Furthermore, the Next Generation Intrusion Prevention System (NIGPS) is more suitable that could provide an intelligent IPS solution for new and unknown attacks. Therefore, this paper presents the limitation of traditional IPS systems, a comparison between IPS and NIGPS and proposes an enhanced model for NIGPS.

     

     


  • Keywords


    Detection; Intrusion Prevention System (IPS); Model; Next Generation Network Intrusion Prevention System (NGIPS).

  • References


      [1] Pirc, J. (2015). Next generation intrusion prevention is… So yesterday. White Paper. http://www.bricata.com.

      [2] Bace, R. (1998). An introduction to intrusion detection and assessment. Infidel Inc.

      [3] Woznick, D. (2014). Global information assurance certification paper. https://www.giac.org/paper/gcfw/441/giac-gcfw-assignment-pass/105451.

      [4] Stiawan, D., Abdullah, A. H. & Idris, M. Y. (2011). Characterizing network intrusion prevention system. International Journal of Computer Application, 14(1), 11-18.

      [5] Catherine, P. (2009). Network security using Cisco IOS IPS. Cisco Press.

      [6] Ghorbani, A. A., Lu, W. & Tavallee, M. (2009). Network intrusion detection and prevention: Concepts and technique. Springer.

      [7] Sekhar, R., Perumal, D. & Rani, S. (2015). Analysis of next generation intrusion prevention system using sensor fusion and fuzzy logic. International Journal of Scientific Research Engineering and Technology, 4(9), 936-938.

      [8] Cisco. (2016). Cisco secure IPS - Excluding false positive alarms. https://www.cisco.com/c/en/us/support/docs/security/ips-4200-series-sensors/13876-f-pos.html#backinfo.

      [9] Venter, H.S & Eloff, J.H.P. (2003). A taxonomy for information security technologies. Computers and Security, 22(4), 299-307.

      [10] Zhang, S., Li, J., Chen, X. & Fan, L. (2008). Building network attack graph for alert causal correlation. Computers and Security, 27(5-6), 188-196.

      [11] Kukielka, P., & Kotulski, Z. (2010). Adaptation of the neural network-based IDS to new attacks detection. https://arxiv.org/ftp/arxiv/papers/1009/1009.2406.pdf.

      [12] Stiawan, D., Abdullah, A. H. & Idris, M. Y. (2010). Classification of habitual activities in behavior-based net-work detection. Journal of Computing, 2, 1-7.


 

View

Download

Article ID: 21371
 
DOI: 10.14419/ijet.v7i4.15.21371




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.