Enter your keyword

2-s2.0-85050393062

[vc_empty_space][vc_empty_space]

Multistage process to decrease processing time in intrusion prevention system

Purwanto Y.a,b, Kuspriyantoa, Hendrawana, Rahardjo B.a

a Bandung Insitute of Technology, Bandung, Indonesia
b Telkom University, Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2017 IEEE.Distributed Denial of Service (DDoS) attack growing larger as growing advance of internet technology and scale. Traffic Anomaly-based Intrusion Detection/Prevention System (IDS/IPS) has proposed as its capability to detect DDoS attack. Unfortunately, the anomaly detection algorithm was limited to detect the existence of an attack. To determine the type of attack, the system must occupy multiclass classification algorithm. However, the complexity of distance-based classification algorithm is always higher than detection algorithm. This research view IPS as one integrated sequence of detection, classification, and prevention process. We propose a multi-stage IPS with the used of distance-based anomaly detection analysis in the first stage, and classification analysis in later stages. The simulation result shows lower processing time of the IPS, with a capability of choosing a certain action for certain type of DDoS attack.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Anomaly-detection algorithms,DDoS,Distance-based classification,Distributed denial of service attack,Intrusion prevention systems,Multi-class classification,multistage,Processing time[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]classification,DDoS,IDS,multistage,processing time[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICWT.2017.8284138[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]