UP - logo
E-viri
Celotno besedilo
Recenzirano
  • Implementing file and real ...
    Veena, K.; Meena, K.

    Cluster computing, 11/2019, Letnik: 22, Številka: Suppl 6
    Journal Article

    Intrusion detection need grows with the increase in the count and volume of Internet Traffic and Network. In this paper, intrusion detection system (IDS) is proposed to identify and distinguish the incoming traffic from the clients and traffic originating through the attackers by using the honeypot security mechanism. Load Balancer is designed and implemented in such a way that it differentiates between the incoming traffic from clients, and the traffic that arises through the attackers. When forwarding the request, it discovers if the traffic is an attack on the server and directs it to a different/alternate server called Honey-Pot. The IDS is developed and intensified with two protocols: File-based detection and Real-time based detection. The File based detection works on question model and the Real-time based detection sets priority levels for accessing data. This acts as a secure-direct protocol thereby increasing the Server protection. The Secure direct method prompts an immediate response to define network intrusions and eliminates human interference to identity the intrusions. Further an interaction with IDS is done to decide whether the traffic is a trespasser. If the traffic is found to be an access user the packet is transmitted to server, but if found to be an unauthorized user, then the IDS directly transmits it to the server.