Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 11, Pages: 1-9
J. Amudhavel1*, V. Brindha1 , B. Anantharaj2 , P. Karthikeyan1 , B. Bhuvaneswari3 , M. Vasanthi1 , D. Nivetha1 and D. Vinodha1
1Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, India; [email protected], [email protected] 2Department of CSE, TCET, Vandavasi - 627425, Tamil Nadu, India; [email protected], [email protected], [email protected], [email protected], [email protected] 3Department of CSE, Pondicherry University, Pondicherry - 605014, Tamil Nadu, India
*Author for Correspondence
J. Amudhavel Department of CSE, SMVEC, Pondicherry - 605107, Tamil Nadu, India; [email protected]
Background/Objectives: To analyze and monitoring the activity of nodes using an IDS Intrusion Detection System which provide security to the system. Findings: In this research, a network building was made with simple node formation with a fitting technique. So that it is easy for a user or beginner to understand the asymptotic dominion factors, due to the wide growth of nodes on network. Intrusion detection system is made of several nodes. These nodes are grouped and combined as a network. Since each node in a network has unique characteristics they may have high chance of attack from malware during the communication between systems. Applications/Improvements: Network of topology is done by creating and connecting various sub networks. Sub networks traffic is cleared and monitored with the package of IDS. It works on synchronous message transfer mode which provides acknowledgement to sender and receiver. All sub networks is managed by its corresponding system and further provide update to the master node on the network. Due to this broadcast of messages all other nodes may be in safe state of avoidance from attacker.
Keywords: Ad-Hoc Network, Conversation Exchange Dynamics, Intrusion Detection System, Intrusion Prevention System, Network Security
Subscribe now for latest articles and news.