Network Security : Hybrid IDPS

  title={Network Security : Hybrid IDPS},
  author={Youssef R. Senhaji},
This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to three threat detection methods. At the end of this paper, we developed a hybrid system consisting of a… 
1 Citations

Figures and Tables from this paper

A Survey on Attack Detection System using Unsupervised Learning Method
This system is improvement over earlier system in which kmeans clustering will be applied over a training samples so that it can categorize the samples into completely different clusters and then it applies statistical methods to seek out the correlation between features to gain information standard deviation, mean and covariance matrix.


Guide to Intrusion Detection and Prevention Systems (IDPS)
The characteristics of IDPS technologies are described and recommendations for designing, implementing, configuring, securing, monitoring, and maintaining them are provided.
Signature Based Intrusion Detection System Using SNORT
This work has implementation the signature based intrusion detection using Snort and will help to novel user to understand the concept of Snort based IDS.
Introduction to reliable distributed programming
This textbook comes with a companion set of running examples implemented in Java that can be used by students to get a better understanding of how reliable distributed programming abstractions can be implemented and used in practice.
, Inc . “ SNORT User ’ s Manual 2 . 9 . 0 ” . The Snort Project
  • 2005
Sécurité et qualité des systèmes d'information - Approche systémique
  • 1992
SNORT User’s Manual 2.9.0
  • The Snort Project
  • 2010