Thursday 28th of March 2024
 

Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic


Fasee Ullah, Waqas Tariq, Muhammad Arshad, Muhammad Saqib and Noor Gul

In Computer Network number of security techniques provide security consolation but not up to optimal security extent. There are massive attacks and efficient viruses travel across the network which incapacitates computer system and default configuration of the operating system. Preceding techniques can capture anomalous activates and previous known attacks but unknown Security attacks have learned to survive in a high secure precinct, it must be noticed by every technical person that virus has an augmenting influence, so it is very difficult to detect unknown attacks at application layer on the run time. This study analyzes some of the best well known Intrusion detection techniques and challenging number of attacks including unknown attacks. This paper presents some of appropriate techniques which are proposed for intrusion detection and anomaly detection.

Keywords: Security; operating system; Network intrusion detection; anomaly detection; Attacks

Download Full-Text


ABOUT THE AUTHORS

Fasee Ullah
Mr. Fasee Ullah is a lecturer in the Department of Computer Sciences, City University of Science & Information Technology - Pakistan. He has teaching as well as research experience. His specialization Areas of research are: Sensor Networks, Security, WiMAX, MANET, Cryptography and Routing Protocols. He has 10 research papers published in various reputed national and international conferences and journals. Currently he has an official reviewer of IEEE and ICCTD conferences. He received his MS (IT) from SZABIST – Pakistan.

Waqas Tariq
Mr. Waqas Tariq is a student of BS (Software Engineering) at Department of Computer Science, City University of Science & Information Technology. He is an undergraduate research scholar. His research interests include Network System Security, Cryptography and Software Engineering. Currently he is working on Network Security and Software Cost Estimation.

Muhammad Arshad
Dr. Muhammad Arshad is Assistant Professor at City University of Science and Information Technology Peshawar. He received his PhD degree in Computer Science from Liverpool John Moores University, Liverpool UK and he has more than 8 years of experience in research and academics. He has more than 12 research publications and his area of expertise are Peer-to-Peer networks, network appliances, Quality of Service, Network Security, Web Services and Home Network.

Muhammad Saqib
Department of Computer Sciences, City University of Science & Information Technology Peshawar, Pakistan

Noor Gul
2Department of Computer Sciences, Islamic International University, Islamabad, Pakistan


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »