Skip to main content
52
Views
493
Downloads
1
1
Reviewed article

Signature-based Intrusion Detection Hardware-Software Complex

How to cite:
Inna Stetsenko, Maksym Demydenko
"Signature-based Intrusion Detection Hardware-Software Complex"
Information & Security: An International Journal,
47
no. 2
(2020):
221-231.
https://doi.org/10.11610/isij.4715

Signature-based Intrusion Detection Hardware-Software Complex

Source:

Information & Security: An International Journal,
Volume: 47,
Issue2,
p.221-231
(2020)

Abstract:

Nowadays hackers are able to find many software vulnerabilities, which can be exploited for malicious purposes such as to destroy the operating system, to steal users’ private data, to demand a ransom not to affect the data and retain their validity. The majority of attacks use an Internet connection; therefore, the efforts should be directed to the way in which data packets are transmitted. The hardware-software complex, which is the main subject of the presented research, serves as a firewall for the devices on one subnetwork with access to the Internet, simultaneously analysing and filtering both downstream and upstream traffic at packet level, resolving scumware and securing the perimeter of each device in the subnet. The concept and the architecture of the developed hardware-software complex are described. The implemented complex will not allow malicious traffic to pass through, providing protection of all endpoint devices in a subnetwork. The experimental results of malware detected are presented, and the security related metrics are evaluated.

52
Views
493
Downloads
1
1
2
Citations
Digital Transformation, Cyber Security and Resilience Second International Conference, DIGILIENCE 2020
1790
(2020):