International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 3- Issue 7, July 2014 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Detecting The Attack On The Distributed Mobile Notice Board Using Android

[Full Text]



Keerthi Rajan, V. Visveswaran



Index terms: Intrusion detection system, malicious activities, notice board system, probe, dos, r2l, and u2r.



Abstract: Intrusion detection system is the key component for ensuring the safety of systems and networks. There are a number of challenges facing by the intrusion detection; an intrusion detection system must efficiently find out the malicious activities in a network and must perform reliably to cope with the network traffic. This paper develops an advanced notice board system using android where the registered members can post their content and which can be seen by the entire member users. Here performing four kind of intrusion detection for the notice board; probe, dos, r2l and u2r detection. Layer based intrusion detection approach is used to detect the four attacks which has been mentioned before.



[1] SANS Institute—Intrusion Detection FAQ, http://www.sans.org/ resources/idfaq/, 2010.

[2] Y.-S. Wu, B. Foo, Y. Mei, and S. Bagchi, “Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS,” Proc. 19th Ann. Computer Security Applications Conf. (ACSAC ’03), pp. 234-244, 2003.

[3] R. Bace and P. Mell, Intrusion Detection Systems, Computer Security Division, Information Technology Laboratory, Nat’l Inst. of Standards and Technology, 2001.

[4] Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and Technology) (800–94). Retrieved 1 January 2010.

[5] A strict anomaly detection model for IDS, Phrack 56 0x11, Sasha/Beetle.

[6] Herv´e Debar, An Introduction to Intrusion-Detection Systems.

[7] Mr.C.Saravanan, Mr.M.V.Shivsankar, Prof.P.Tamije Selvy, Mr.S.Anto,
An Optimized Feature Selection for Intrusion Detection using Layered Conditional Random Fields with MAFS, 2012.

[8] Ankita Gaur, Vineet Richariya, A Layered Approach for Intrusion Detection Using Meta-modeling with Classification Techniques.

[9] Brajesh Patel, An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols.

[10] KDD Cup 1999 Intrusion Detection Data, http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html, 2010.