By Topic

The trends of Intrusion Prevention System network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Stiawan, D. ; Fac. of Comput. Sci., Sriwijaya Univ., Indonesia ; Abdullah, A.H. ; Idris, M.Y.

In recent years, Intrusion Prevention System (IPS) have been widely implemented to prevent from suspicious threat. Unlike traditional Intrusion Detection System, IPS has additional features to secure computer network system. The additional features identifying and recognizing suspicious threat trigger alarm, event notification, through responsible response. However, IPS has issues problem, which affect the utilized overall system. In this paper we present the main challenging problem and steps to avoid that, such as (i) accuracy signature, (ii) the traffic volume, (iii) topology design, (iv) quota usage logging, (v) protecting intrusion prevention system, (vii) monitoring sensor, and (viii) collaboration of UTM. Finally, as part of our enhancements, we explored the possibility of making framework to collaborate and integrated various technologies of defense system, we called Unified Threat Management (UTM).

Published in:

Education Technology and Computer (ICETC), 2010 2nd International Conference on  (Volume:4 )

Date of Conference:

22-24 June 2010