Friday 19th of April 2024
 

A Survey on IPS Methods and Techniques


K. Prabha and S. Sudha Sree

The quality and impact of attacks have been continuously increases; attackers continuously find vulnerabilities at various levels, from the network itself to operating system and applications, exploit to crack the system and services. Defence system and networking monitoring has becomes essential component of computer security to predict and present attacks. IPS can be termed as the extension of IDS with exercise of access control to protect computers from exploitation. IPS is an intelligent device that is capable of not only detecting malicious activities, but also to take preventive actions to secure both the host and the network attacks. An IPS works inline in the data stream to provide protection from malicious attacks in real time. This is called inline mode. In this paper the deeper analysis is the IPS identify, stop and block attacks that would normally pass through a traditional fire wall devices.

Keywords: IPS, firewall, Signature detection, Stateful Protocol, IP TTL, Security System

Download Full-Text


ABOUT THE AUTHORS

K. Prabha
Department of computer science, Assistant Professor.

S. Sudha Sree
Department of computer science, Research Scholar.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »