SlideShare a Scribd company logo
ABSTRACT
This bachelore thesis consist from: 64 pages,12 diagrams,23refrences,1 appendix
In this thesis I analyzed and studies to consider the most efficient way
to protect our online resources and information, specially private and
essential information ,from all kinds of cyber predators. To do so on a
professional level, IDSIPS will come in with all the right purposes ,thus ,I
will elaborate on the relationship of security and IDIPS, as well as its
types and methods, but the main aim to this paper along side introducing
IDSIPS and all of if features benefits and disadvantages, I also looked into
ways that can help improving the performance and scale of work under
critical conditions concerning cyber security .A way to make IDSIPS work
independently as an intelligent agent for all defensive and protective
purposes with very high abilities of learning, responding and acting with
great reflex toward all undesired events and actions in the network, Using
the ANN(Artificial Neural Network).
The main approach here is to construct a large scale protection system,
which is the IDSPS but with an intelligent agent, which is the ANN ,The
ANN can be very promising because, its low coast with not much ruling
and instructions to guide with, it can ultimately be the most reliable
approach to counter the matter of cyber crimes and risks, for a very simple
reason, Being self learning and self developing, the ANN can be very
active when coming to being up to date, it consume knowledge and learn
very fast ,through a specific set of learning methods conducted with
endless amount of algorithms introduced to the ANN, according to the
desired tasks ,as a matter of fact ,using the same types of algorithms we
can program the ANN to learn automatically ,as the development of the
cyber crimes continues with time, and different types of breaches and
attacking and hacking techniques and ways being discovered and used to
intrude, the ANN can keep up and adjust to environment with all of its
aspects and keep up with the track of time to protect the network
efficiently.
Furthermore, the paper will also point out the different directions in
which research on neural networks concentrate and the developments and
expected future in the intrusion detection and prevention (IDPS) field.
CONTENT
|INTRODUCTION……………………………………………………..1
|CHAPTER.1 OVERVIEW OF SECURITY RISKS AND PROTECTION
TECHNOLOGIES
1.1 OVERVIEW OF THREATS AND RISKS IN THE CYBER WORL…2-7
1.2 SECURITY IN CYBER WORLD…………………………………….8-9
1.3 BASIC CONCEPT OF IDS/IPS……………………………………….9-11
CHAPTER.2 ANALYSISOF IDSIPS SOLUTIONS
2.1 UNDERSTANDING IDS/IPS……………………………………….12-14
2.2 METHODS OF IDS/IPS ……………………………………….15-17
2.3 BEST IDSIPS SOLUTIONS………………………………………..17-20
2.4 NEXT GENERATION IDSIPS SOULTION…………………....20-23
|CHPATER.3 A NEW METHODFOR LARGE SCALE NETWORK
PROTECTION(IIDSIPS) OF ENTERPRISER ENVIRONMENT
3.1 IIDSPS( INTELLIGENT INTRUSION DETECTION AND PREVENTION
SYSTEM)………………………………………………….24-25
3.2 THE NURALNETWORK…………26-33
3.3 THE DESIGNING AND CONSTRUCTIONOF IIDSIPS……34-53
3.4 HOW DOES IIDSIPS WORK(METHOD DESCRIPTION)……… …54-57
|CHAPTER.4 RESULTS OF USING INTELLIGENT INTRUSION
DETECTIUON AND PREVENTION SYSTEM
4.1 ADVANTAGES AND DISADVATANGES…………………………58-59
4.2CONCLUSION………………………………………..60-61
BIBLOGROPHY…………………………………………………..............62-64
LIST OF KEY WORDS
IDSIPS- INRUSTION DECTECTION SYSTEM AND INTRUSTION
PREVENTION SYSTEM
IDS- INTRUSION DETECTION SYSTEM
IPS- INTRUSION PREVENTION SYSTEM
NGIPS- NEXT GENERATION INTRUSTION PREVENTION SYSTEM
DOS- DENIAL OF SERVICE
AMP- ADVANCED MALWARE PROTECTION
IIDSIPS- INTELLIGENT INTRUSION DETECTION SYSTEM AND
PREVENTION SYSTEM
ANN- ARTIFICAL NEURAL NETWORK
MLP- MULTI-LEVEL PRECEPTRON
SOM- SELF ORGANIZING MAP

More Related Content

What's hot

Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
Kabul Education University
 
OWASP AppSec Europe 2009 Conference
OWASP AppSec Europe 2009 ConferenceOWASP AppSec Europe 2009 Conference
OWASP AppSec Europe 2009 Conference
SebaDeleersnyder
 
Resume (Abhijit Gupta)
Resume (Abhijit Gupta)Resume (Abhijit Gupta)
Resume (Abhijit Gupta)Abhijit Gupta
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
Phdtopiccom
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
NECST @ Microsoft
NECST @ Microsoft NECST @ Microsoft
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentationUshnish Chowdhury
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
Edgar Mwangangi
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Arpit Singh
 
Network security
Network securityNetwork security
Network security
nageshkanna13
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
JoAnna Cheshire
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
IGZ Software house
 
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
 How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas) How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
Franklin Mosley
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
waqasahmad1995
 
Network security
Network securityNetwork security
Network security
chauhankapil
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
RAVIKUMAR Digital Signal Processing
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
network security
network securitynetwork security
network security
PREMKUMAR
 

What's hot (20)

Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
OWASP AppSec Europe 2009 Conference
OWASP AppSec Europe 2009 ConferenceOWASP AppSec Europe 2009 Conference
OWASP AppSec Europe 2009 Conference
 
Resume (Abhijit Gupta)
Resume (Abhijit Gupta)Resume (Abhijit Gupta)
Resume (Abhijit Gupta)
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
NECST @ Microsoft
NECST @ Microsoft NECST @ Microsoft
NECST @ Microsoft
 
Final_year_project_documentation
Final_year_project_documentationFinal_year_project_documentation
Final_year_project_documentation
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
Network security
Network securityNetwork security
Network security
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
 How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas) How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security
Network securityNetwork security
Network security
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
network security
network securitynetwork security
network security
 

Viewers also liked

Visual basics Express Project
Visual basics Express ProjectVisual basics Express Project
Visual basics Express Project
Iftikhar Ahmed
 
How to Increase the Number of Subscribers to Your Blog?
How to Increase the Number of Subscribers to Your Blog?	How to Increase the Number of Subscribers to Your Blog?
How to Increase the Number of Subscribers to Your Blog?
theblogging hacks
 
Прайс лист жестких дисков
Прайс лист жестких дисковПрайс лист жестких дисков
Прайс лист жестких дисков
alex_strix
 
Nepotism, communication skills
Nepotism, communication skillsNepotism, communication skills
Nepotism, communication skills
Iftikhar Ahmed
 
Derecho procesal (resumen)
Derecho procesal (resumen)Derecho procesal (resumen)
Derecho procesal (resumen)
Alvaro Jesus
 
Mi sesión fotográfica
Mi sesión fotográficaMi sesión fotográfica
Mi sesión fotográfica
maria monfort font
 
Capacitor with a dielectric
Capacitor with a dielectricCapacitor with a dielectric
Capacitor with a dielectric
Iftikhar Ahmed
 

Viewers also liked (8)

Visual basics Express Project
Visual basics Express ProjectVisual basics Express Project
Visual basics Express Project
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
How to Increase the Number of Subscribers to Your Blog?
How to Increase the Number of Subscribers to Your Blog?	How to Increase the Number of Subscribers to Your Blog?
How to Increase the Number of Subscribers to Your Blog?
 
Прайс лист жестких дисков
Прайс лист жестких дисковПрайс лист жестких дисков
Прайс лист жестких дисков
 
Nepotism, communication skills
Nepotism, communication skillsNepotism, communication skills
Nepotism, communication skills
 
Derecho procesal (resumen)
Derecho procesal (resumen)Derecho procesal (resumen)
Derecho procesal (resumen)
 
Mi sesión fotográfica
Mi sesión fotográficaMi sesión fotográfica
Mi sesión fotográfica
 
Capacitor with a dielectric
Capacitor with a dielectricCapacitor with a dielectric
Capacitor with a dielectric
 

Similar to ABSTRACTCONTENTABRIVIATION

Intrusion detection method for internet of things based on the spiking neural...
Intrusion detection method for internet of things based on the spiking neural...Intrusion detection method for internet of things based on the spiking neural...
Intrusion detection method for internet of things based on the spiking neural...
IJECEIAES
 
J1802056063
J1802056063J1802056063
J1802056063
IOSR Journals
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
IJRES Journal
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
IJNSA Journal
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
IJNSA Journal
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
IJNSA Journal
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
ijwmn
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingOluseyi Akindeinde
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
Journal For Research
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
Cynthia King
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
IRJET Journal
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET Journal
 
Intrusion Detection System Essay
Intrusion Detection System EssayIntrusion Detection System Essay
Intrusion Detection System Essay
Candice Him
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET Journal
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
theijes
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
IJERA Editor
 

Similar to ABSTRACTCONTENTABRIVIATION (20)

Intrusion detection method for internet of things based on the spiking neural...
Intrusion detection method for internet of things based on the spiking neural...Intrusion detection method for internet of things based on the spiking neural...
Intrusion detection method for internet of things based on the spiking neural...
 
J1802056063
J1802056063J1802056063
J1802056063
 
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural NetworkAlert Analysis using Fuzzy Clustering and Artificial Neural Network
Alert Analysis using Fuzzy Clustering and Artificial Neural Network
 
Machine learning in network security using knime analytics
Machine learning in network security using knime analyticsMachine learning in network security using knime analytics
Machine learning in network security using knime analytics
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICSMACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
MACHINE LEARNING IN NETWORK SECURITY USING KNIME ANALYTICS
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
 
Attack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_ModelingAttack_Simulation_and_Threat_Modeling
Attack_Simulation_and_Threat_Modeling
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Artificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber SecurityArtificial Intelligence Techniques for Cyber Security
Artificial Intelligence Techniques for Cyber Security
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
Intrusion Detection System Essay
Intrusion Detection System EssayIntrusion Detection System Essay
Intrusion Detection System Essay
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
1776 1779
1776 17791776 1779
1776 1779
 

ABSTRACTCONTENTABRIVIATION

  • 1. ABSTRACT This bachelore thesis consist from: 64 pages,12 diagrams,23refrences,1 appendix In this thesis I analyzed and studies to consider the most efficient way to protect our online resources and information, specially private and essential information ,from all kinds of cyber predators. To do so on a professional level, IDSIPS will come in with all the right purposes ,thus ,I will elaborate on the relationship of security and IDIPS, as well as its types and methods, but the main aim to this paper along side introducing IDSIPS and all of if features benefits and disadvantages, I also looked into ways that can help improving the performance and scale of work under critical conditions concerning cyber security .A way to make IDSIPS work independently as an intelligent agent for all defensive and protective purposes with very high abilities of learning, responding and acting with great reflex toward all undesired events and actions in the network, Using the ANN(Artificial Neural Network). The main approach here is to construct a large scale protection system, which is the IDSPS but with an intelligent agent, which is the ANN ,The ANN can be very promising because, its low coast with not much ruling and instructions to guide with, it can ultimately be the most reliable approach to counter the matter of cyber crimes and risks, for a very simple reason, Being self learning and self developing, the ANN can be very active when coming to being up to date, it consume knowledge and learn very fast ,through a specific set of learning methods conducted with endless amount of algorithms introduced to the ANN, according to the desired tasks ,as a matter of fact ,using the same types of algorithms we can program the ANN to learn automatically ,as the development of the cyber crimes continues with time, and different types of breaches and attacking and hacking techniques and ways being discovered and used to intrude, the ANN can keep up and adjust to environment with all of its aspects and keep up with the track of time to protect the network efficiently. Furthermore, the paper will also point out the different directions in which research on neural networks concentrate and the developments and expected future in the intrusion detection and prevention (IDPS) field.
  • 2. CONTENT |INTRODUCTION……………………………………………………..1 |CHAPTER.1 OVERVIEW OF SECURITY RISKS AND PROTECTION TECHNOLOGIES 1.1 OVERVIEW OF THREATS AND RISKS IN THE CYBER WORL…2-7 1.2 SECURITY IN CYBER WORLD…………………………………….8-9 1.3 BASIC CONCEPT OF IDS/IPS……………………………………….9-11 CHAPTER.2 ANALYSISOF IDSIPS SOLUTIONS 2.1 UNDERSTANDING IDS/IPS……………………………………….12-14 2.2 METHODS OF IDS/IPS ……………………………………….15-17 2.3 BEST IDSIPS SOLUTIONS………………………………………..17-20 2.4 NEXT GENERATION IDSIPS SOULTION…………………....20-23 |CHPATER.3 A NEW METHODFOR LARGE SCALE NETWORK PROTECTION(IIDSIPS) OF ENTERPRISER ENVIRONMENT 3.1 IIDSPS( INTELLIGENT INTRUSION DETECTION AND PREVENTION SYSTEM)………………………………………………….24-25 3.2 THE NURALNETWORK…………26-33 3.3 THE DESIGNING AND CONSTRUCTIONOF IIDSIPS……34-53 3.4 HOW DOES IIDSIPS WORK(METHOD DESCRIPTION)……… …54-57 |CHAPTER.4 RESULTS OF USING INTELLIGENT INTRUSION DETECTIUON AND PREVENTION SYSTEM 4.1 ADVANTAGES AND DISADVATANGES…………………………58-59 4.2CONCLUSION………………………………………..60-61 BIBLOGROPHY…………………………………………………..............62-64
  • 3.
  • 4. LIST OF KEY WORDS IDSIPS- INRUSTION DECTECTION SYSTEM AND INTRUSTION PREVENTION SYSTEM IDS- INTRUSION DETECTION SYSTEM IPS- INTRUSION PREVENTION SYSTEM NGIPS- NEXT GENERATION INTRUSTION PREVENTION SYSTEM DOS- DENIAL OF SERVICE AMP- ADVANCED MALWARE PROTECTION IIDSIPS- INTELLIGENT INTRUSION DETECTION SYSTEM AND PREVENTION SYSTEM ANN- ARTIFICAL NEURAL NETWORK MLP- MULTI-LEVEL PRECEPTRON SOM- SELF ORGANIZING MAP