PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

New architecture of system intrusion detection and prevention

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this article there has been presented new intrusion detection and prevention algorithm implemented on Raspberry Pi platform. The paper begins with the presentation of research methodology in the field of Intrusion Detection Systems. Adequate supervision and control over network traffic is crucial for the security of information and communication technology. As a result of the limited budget allocated for the IT infrastructure of small businesses and the high price of dedicated solutions, many companies do not use mentioned systems. Therefore, in this order, there has been proposed monitoring solution based on the generally available Raspberry Pi platform. The paper is addressed to network administrators.
Słowa kluczowe
Rocznik
Strony
20--24
Opis fizyczny
Bibliogr. 15 poz., rys.
Twórcy
autor
  • Faculty of Electrical and Computer Engineering, Rzeszow University of Technology Rzeszow, Poland
autor
  • University of Information Technology and Management in Rzeszow, Rzeszow, Poland
autor
  • Rzeszow University of Technology Rzeszow, Poland
Bibliografia
  • [1] E. Denning D., "An intrusion-detection model ," IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 13, no. 2, pp. 222-232, 1987.
  • [2] S. Axelsson, "Research in Intrusion-Detection Systems," Göteborg, 1998.
  • [3] H. Debar, M. Dacier, and A. Wespi, "Towards a Taxonomy of Intrusion-Detection Systems ," Rüschlikon, 1998.
  • [4] A. Lazarevic, V. Kumar, and J. Srivastava, Intrusion detection: A survey. Minneapolis: Computer Science Department, University of Minnesota, 2005.
  • [5] Z. Zhou, L. Liu, and G. Han, "Survival Continuity on Intrusion Detection System of Wireless Sensor Networks," in International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Kraków, 2015, pp. 775-779.
  • [6] D. W. Straub, S. Goodman, and R. L. Baskerville, Information Security. Policy, Process and Practices. London: M.E. Sharpe, 2008.
  • [7] H. F. Tipton and M. Krause, Information Security Management Handbook, 6th ed. Boca Raton: CRC Press, 2012.
  • [8] J. S. Tiller R. O’Hanley, Information Security Management Handbook. Boba Raton, USA: CRC Press, 2014.
  • [9] M. Hajder, P. Hajder, and M. Nycz, "Inteligentna analiza danych jako metoda detekcji ataków na sieci," in Innowacyjna gmina. Bezpieczeństwo i ekologia. Rzeszów: Wyższa Szkoła Informatyki i Zarządzania z siedzibą w Rzeszowie, 2013, pp. 7-25.
  • [10] M. Stamp, Information Security: Principles and Practice, 2nd ed. New York: Wiley & Sons, 2011.
  • [11] T. R. Peltier, Information security policies and procedures : a practitioner’s references. Boca Raton: CRC Press, 1998.
  • [12] A. Laukaitis and O. Vasilecas, "Formal concept analysis and information systems modeling," in Proceedings of the 2007 international conference on Computer systems and technologies, Burgas, Bulgaria, 2007, pp. 1-6.
  • [13] G. Marakas and J. A. O'Brien, Introduction to Information Systems, 16th ed. New York, NY: McGraw-Hill, 2013.
  • [14] W. R. Bitman, "Information systems modeling: an object oriented development method," in Proceedings of the ninth Washington Ada symposium on Ada: Empowering software users and developers, McLean, Virginia, USA, 1992, pp. 93-105.
  • [15] R. Bejtlich, Practice Of Network Security Monitoring. San Francisco, USA: no starch press, 2013.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8953871c-8471-454c-a7c0-8eacefb1c2f2
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.