An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks

Author(s):  
Nana K. Ampah ◽  
Cajetan M. Akujuobi

Designing, planning, and managing telecommunication, industrial control, and enterprise networks with special emphasis on effectiveness, efficiency, and reliability without considering security planning, management, and constraints have made them vulnerable. They have become more vulnerable due to their recent connectivity to open networks with the intention of establishing decentralized management and remote control. Existing Intrusion Prevention and Detection Systems (IPS and IDS) do not guarantee absolute security. The new IDS, which employs both signature-based and anomaly detection as its analysis strategies, will be able to detect both known and unknown attacks and further isolate them. Auto-reclosing techniques used on long rural power lines and multi-resolution techniques were used in developing this IDS, which will help update existing IPSs. It should effectively block Distributed Denial of Service attack (DDoS) based on SNY-flood attacks and help eliminate four out of the five major limitations of existing IDSs and IPSs.

Author(s):  
Cajetan M. Akujuobi ◽  
Nana K. Ampah

Most of the existing networks (e.g., telecommunications, industrial control, enterprise networks etc.) have been globally connected to open computer networks (Internet) in order to decentralize planning, management and controls in business. Most of these networks were originally designed without security considerations, thereby making them vulnerable to cyber attacks. This has given rise to the need for efficient and scalable intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) to secure existing networks. Existing IDSs and IPSs have five major limitations, which prevent them from securing networks absolutely. It has been proven that the right combination of security techniques always protects networks better. This approach used change in Hurst parameter and a signal processing application of wavelets (i.e., multi-resolution technique) to develop an IDS. The novelty of our proposed IDS technique presented in this chapter lies in its efficiency and ability to eliminate most of the limitations of existing IDSs and IPSs, thereby ensuring high level network protection.


Sign in / Sign up

Export Citation Format

Share Document