EUDIS-An Encryption Scheme for User-Data Security in Public Networks
The method of introducing the proxy interpretation for sending and receiving requests increase the capability of the server and our approach UDIV (User-Data Identity Security) to solve the data and user authentication without extending size of the data makes better than hybrid IDS (Intrusion Detection System). And at the same time all the security stages we have framed have to pass through less through that minimize the response time of the request. Even though an anomaly detected, before rejecting it the proxy extracts its identity to prevent it to enter into system. In case of false anomalies, the request will be reshaped and transformed into legitimate request for further response. Finally we are holding the normal and abnormal requests in two different queues with own priorities.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1337853Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1427
 D.J. Day and Z. Zhao, "Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems.," International Journal of Automation and Computing, vol. 8, no. 4, pp. 472-483, Dec. 2011.
 W. R. Cheswick, S. M. Bellovin, and A.D. Rubin, "Intrusion Detection," in Firewalls and Internet Security: Repelling the Wily Hacker, 2nd ed. Boston: Addison-Wesley, 2003, pp. 279-283.
 Ryan Trost, "Intrusion Detection Systems," in Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century, Karen Gettman, Ed. Boston, USA: Addison-Wesley, 2010, ch. 3, pp. 53-85.
 P. M. Mafra, V.Moll, J. da Silva Fraga, and A.O.Santin, "Octopus-IIDS: An Anomaly Based Intelligent Intrusion Detection System," in IEEE Symposium on Computers and Communications, Riccione, Italy, 22-25 June 2010, pp. 405-410.
 S. Jajodia, Intrusion Detection Systems, R.Di Pietro and L.V. Mancini, Eds. New York, US: Springer, 2008.
 W.Li, Z.Li, H.Shi, and W.Li, "A Novel Intrusion Detection System for E-Commerce System," in International Conference on Management of e- Commerce and e-Government, Nanchang, China, 16-19 September 2009, p. 454.
 Z.Trabelsi and R.Mahdy, "An Anomaly Intrusion Detection System Employing Associative String Processor," in Ninth International Conference on Networks, Menuires, France, 11-16 April 2010, p. 220.
 C.C.Lo, C.C.Huang, and J.Ku, "A Cooperative Intrusion Detection System Framework for Cloud Computing Networks," in 39th International Conference on Parallel Processing Workshops, San Diego, USA, 13-16 September 2010, p. 281.
 J.Yang, X.Chen, X.Xiang, and J.Wan, "HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree," in International Conference on Communications and Mobile Computing, Shenzhen, China, 12-14 April 2010, p. 70.
 J.Mallery et al., "Intrusion Detection and Response," in Hardening Network Security, Jane K. Brownlow, Ed. Emeriville: McGraw-HIll, 2005, pp. 365-386.
 E.Flior et al., "A Knowledge-Based System Implementation of Intrusion Detection Rules," in IEEE Seventh International Conference on Information Technology, Las Vegas, USA, 12-14 April 2010, pp. 738- 739.
 S.Ohtahara, T.Kamiyama, and Y.Oyama, "Anomaly-based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines," in Ninth IEEE International Conference on Computer and Information Technology, Xiamen, China, 11-14 October 2009, pp. 217- 219.
 D.L. Prowse, "Computer Security," in CompTIA Security+ SY0-201 Cert Guide. Indianapolis, USA: Pearson Certification, 2011, ch. 2, p. 35.
 L.Gui-Xiang and G.Wei-Min, "Research on Network Security System Based on intrusion Detection," in International Conference on EBusiness and E-Government, Guangzhou, China, 7-9 May 2010, p. 2096.
 F.Haddadi, S.Khanchi, M.Shetabi, and V.Derhami, "Intrusion Detection and Attack Classification Using Feed-Forward Neural Network," in Second International Conference on Computer and Network Technology, Bangkok, Thailand, 23-25 April 2010, p. 262.