IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Detecting Cyber Threats With a Graph-Based NIDPS

Detecting Cyber Threats With a Graph-Based NIDPS
View Sample PDF
Author(s): Brendan Ooi Tze Wen (Taylor's University, Malaysia), Najihah Syahriza (Taylor's University, Malaysia), Nicholas Chan Wei Xian (Taylor's University, Malaysia), Nicki Gan Wei (Taylor's University, Malaysia), Tan Zheng Shen (Taylor's University, Malaysia), Yap Zhe Hin (Taylor's University, Malaysia), Siva Raja Sindiramutty (Taylor's University, Malaysia)and Teah Yi Fan Nicole (Taylor's University, Malaysia)
Copyright: 2024
Pages: 39
Source title: Cybersecurity Measures for Logistics Industry Framework
Source Author(s)/Editor(s): Noor Zaman Jhanjhi (School of Computing Science, Taylor’s University, Malaysia)and Imdad Ali Shah (School of Computing Science, Taylor’s University, Malaysia)
DOI: 10.4018/978-1-6684-7625-3.ch002

Purchase

View Detecting Cyber Threats With a Graph-Based NIDPS on the publisher's website for pricing and purchasing information.

Abstract

This chapter explores the topic of a novel network-based intrusion detection system (NIDPS) that utilises the concept of graph theory to detect and prevent incoming threats. With technology progressing at a rapid rate, the number of cyber threats will also increase accordingly. Thus, the demand for better network security through NIDPS is needed to protect data contained in networks. The primary objective of this chapter is to explore the concept of a novel graph based NIDPS through four different aspects: data collection, analysis engine, preventive action, and reporting. Besides analysing existing NIDS technologies in the market, various research papers and journals were explored. The authors' solution covers the basic structure of an intrusion detection system, from collecting and processing data to generating alerts and reports. Data collection explores various methods like packet-based, flow-based, and log-based collections in terms of scale and viability.

Related Content

Azeem Khan, Noor Zaman Jhanjhi, Haji Abdul Hafidz B. Haji Omar, Dayang Hajah Tiawa B. Awang Haji Hamid. © 2024. 35 pages.
Brendan Ooi Tze Wen, Najihah Syahriza, Nicholas Chan Wei Xian, Nicki Gan Wei, Tan Zheng Shen, Yap Zhe Hin, Siva Raja Sindiramutty, Teah Yi Fan Nicole. © 2024. 39 pages.
Sidra Tahir, Anam Zaheer. © 2024. 17 pages.
Tayyab Rehman, Noshina Tariq, Muhammad Ashraf, Mamoona Humayun. © 2024. 24 pages.
Noshina Tariq, Tehreem Saboor, Muhammad Ashraf, Rawish Butt, Masooma Anwar, Mamoona Humayun. © 2024. 25 pages.
Sidra Tahir. © 2024. 15 pages.
Siva Raja Sindiramutty, Noor Zaman Jhanjhi, Chong Eng Tan, Navid Ali Khan, Bhavin Shah, Loveleen Gaur. © 2024. 68 pages.
Body Bottom