A Trio Model for Network Insider Intrusion Detection & Prevention System

Authors

  • Charles Orhionkpaiyo Federal University of Petroleum Resources, Effurun, Nigeria
  • Opani Aweh

Keywords:

Forensic Analysis, Trio model, Network Intrusion Detection, Insider Threats, Network Security, Honeypot, Horney-Token, Wireshark.

Abstract

The increasing reliance on computer networks and the internet by organizations have no doubt exposed their information to attacks from both outsiders and from the organization insiders. Different countermeasures are currently being adopted to secure information from attacks. These countermeasures are often deployed in isolation and they are all essentially designed to checking outsider threats or attacks. In this paper, an integrated approach to deploying these counter measures is proposed, and the possibility of deploying these counter measures to check insider attacks is presented.

References

B. M Bowen, B. E Salem, A. D Keromytis, and S. J Stolfo.

A. McCormac, K. Parsons, M. Butavicius. Preventing and Profiling Malicious Insider Attacks. Defence Science and Technology Organization Document Control Data, Australia, Pp 1-17, 2012. http://www.dtic.mil/dtic/tr/fulltext/u2/a563808.pdf

T. Birdi, K. Jansen. (2006)

J. Andress. The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice. London: Elsevier Academic Press, p117, 2011.

D.W Chadwick.

R. Trzeciak. Risk Mitigation Strategies: Lessons Learned from Actual Insider Attacks. Internet: http://www.cert.org/insider_threat/ , 2012 (Accessed 09/08/2013)

R. Bace, P. Mell. Intrusion Detection Systems. NIST Special Publications SP 800, U S Department of Defense, Pp. 40-43, 2001

T. Ryuto, C. Neuman.

P. Gaonjur, C.Bokhoree.

L. Spitzner.

B. Mcfarland. Ethical Deception and Pre-emptive Deterrence in Network Security, SANS Institute GCFW Practical Version 4.1, SANS Institute 2000-2005.

B. Ruppert.

C. Eoghan, W.R Curtis. Hand Book of Digital Forensics and Investigations, Elsevier Academic Press, London, 3rd ed, pp201-219, 2010.

Downloads

Published

2015-01-17

How to Cite

Orhionkpaiyo, C., & Aweh, O. (2015). A Trio Model for Network Insider Intrusion Detection & Prevention System. International Journal of Sciences: Basic and Applied Research (IJSBAR), 19(2), 281–294. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/3273

Issue

Section

Articles