dc.description.abstract |
The rapid proliferation of Information System networks and IS an application has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. There are several kinds of intruders that can affect to company information system. They may be inside or outside users. Sometimes it may be authorized or unauthorized users. These intruders slow down high-speed internet connection as well as high performance and expensive IT resources. Because they are looking around the world for idle IT resources for running their processor inside others resources. The network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defence. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective.
In this research, examine the vulnerabilities of networks and say that we must include intrusion detection in the security architecture for computing environment. We have showed such architecture and evaluated key mechanisms in this architecture such as applying sensors to intrusion detection, anomaly detection and misuse detection for ad-hoc networks. |
en_US |