Network Intrusion Detection System Based on Matching Logical Address and Port Number

Authors

  • Najmadin Wahid Abdulrahman Boskany College of Science, University of Sulaimani, Kurdistan Region, Iraq. Author

DOI:

https://doi.org/10.17656/jzs.10200

Keywords:

Network Intrusion Detection System (NIDS), Logical Address, Network Interface Card (NIC), Firewall, Application Programming Interface (API), Dynamic Link Library (DLL)

Abstract

The aim of this paper is to design a significant system for detecting intrusion hosts inside computer networks. The goal is to let network administrators detect and discover if possible hackers (unauthorized hosts) that attempt to break into network infrastructure exist or no, who observe network traffic or try to cause service attack, by accident or with purpose.

References

Salim R. and Rao Radha Krishna G. S. V., “Design and Development of Network Intrusion Detection System Detection Scheme on Network Processing Unit”, 2006, ISBN 89-5519-129-4.,. DOI: https://doi.org/10.4018/978-1-59904-168-1.ch007

Najeeb A. A., “Development and Implementation of Network Security Manager” 2007, M.Sc. Thesis ,University of Sulaimani,

Zhong C.and Chen Guo-Liang, “A fast determinate string matching algorithm for the network intrusion detection systems”, 2007,1-4244-0973-X, IEEE, DOI: https://doi.org/10.1109/ICMLC.2007.4370694

Blustein James, Fu Ching-Lung and Silver Daniel L. “ Information visualization for and Intrusion detection System”, ACM:, 2005. DOI: https://doi.org/10.1145/1083356.1083419

Salim Robin and Rao Radha Krishna G. S. V., “Software-Based packet Classification in Network Intrusion Detection System using network Processor”, IEEE, 2006. DOI: https://doi.org/10.1109/TENCON.2006.343902

Wang Y., Huang G. X. and Peng D. G., ”Model of Network Intrusion Detection System based on BP Algorithm”, IEEE, 2006. DOI: https://doi.org/10.1109/ICIEA.2006.257104

Bolzoni Damino, Etalle Sando, Hartel Pieter “POSEIDON:a 2-tier Anomaly-Based Network Intrusion Detection System”, proceeding of the forth IEEE international on information assurance, 2006.

Sekar R. guang Y. Verma S. and Shanbhag T., “A High Performance Network Intrusion Detection System”, ACM, 1999 DOI: https://doi.org/10.1145/319709.319712

Published

2008-11-05

How to Cite

Network Intrusion Detection System Based on Matching Logical Address and Port Number. (2008). Journal of Zankoy Sulaimani - Part A, 12(1), 103-107. https://doi.org/10.17656/jzs.10200