TY - GEN
T1 - Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection
AU - Sharma, Shashank
AU - Prajapat, Shaligram
AU - Naik, Nitin
PY - 2024/12/19
Y1 - 2024/12/19
N2 - This study proposes implementing a comprehensive framework for digital infrastructure, designed for securing large Enterprise networks. This study aims to analyze the existing mechanisms for preventing emerging cyber-attacks by analyzing the patterns associated with potential cyber-attacks, leading insights for future behavior and detection of those attacks, with the use of customized open-source security tools and the development of a few new tools and self-developed scripts/code for centralized solution for infrastructure security needs. This research further proposes data analysis approaches and tools to evaluate datasets derived from Honeynets and from actual servers/machines, specifically focusing on attackers and malicious traffic from hosts. The ultimate goal is to provide additional critical information to IT and security administrators i.e.: motives behind attacks, communication methods, attack mechanism, the timing of system attacks, and the subsequent actions performed by attackers after compromising a system.
AB - This study proposes implementing a comprehensive framework for digital infrastructure, designed for securing large Enterprise networks. This study aims to analyze the existing mechanisms for preventing emerging cyber-attacks by analyzing the patterns associated with potential cyber-attacks, leading insights for future behavior and detection of those attacks, with the use of customized open-source security tools and the development of a few new tools and self-developed scripts/code for centralized solution for infrastructure security needs. This research further proposes data analysis approaches and tools to evaluate datasets derived from Honeynets and from actual servers/machines, specifically focusing on attackers and malicious traffic from hosts. The ultimate goal is to provide additional critical information to IT and security administrators i.e.: motives behind attacks, communication methods, attack mechanism, the timing of system attacks, and the subsequent actions performed by attackers after compromising a system.
UR - https://link.springer.com/book/10.1007/978-3-031-74443-3
U2 - 10.1007/978-3-031-74443-3
DO - 10.1007/978-3-031-74443-3
M3 - Conference publication
SN - 9783031744426
T3 - Lecture Notes in Networks and Systems (LNNS)
SP - 625
EP - 634
BT - Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI, July 3–4, 2024, London, UK: The C3AI 2024
A2 - Naik, Nitin
A2 - Jenkins, Paul
A2 - Prajapat, Shaligram
A2 - Grace, Paul
ER -