Design and Construction of a Computer Network Security System Using the Intrusion Detection System (IDS) Method
Keywords:
Network Security, Intrusion Detection System (IDS), Cyber Threats, Anomaly Detection, Machine LearningAbstract
In today's digital era, cyber threats such as malware, unauthorized access, and distributed denial-of-service (DDoS) attacks pose significant risks to organizations and individuals. Traditional security measures like firewalls and encryption provide a foundational defense but often fail to detect sophisticated and evolving cyberattacks. This research focuses on the design and construction of a computer network security system using the Intrusion Detection System (IDS) method, aiming to enhance threat detection and mitigation capabilities. The study explores a hybrid IDS framework that combines signature-based, anomaly-based, and machine learning techniques to improve detection accuracy while minimizing false positive and false negative rates. The system is tested in a controlled network environment using real-world cybersecurity datasets to evaluate its effectiveness in identifying various attack patterns. Performance metrics such as detection accuracy, system resource utilization, and response time are analyzed to assess the efficiency of the proposed IDS model. The research findings demonstrate that the optimized IDS framework significantly enhances network security by providing real-time monitoring, adaptive threat analysis, and automated response mechanisms. Compared to traditional IDS models, the proposed system shows improved accuracy in identifying emerging threats while reducing unnecessary false alarms. Additionally, the study discusses the feasibility of integrating the IDS into cloud-based infrastructures and IoT networks, ensuring broader applicability in modern cybersecurity frameworks. This research contributes to the field of network security by developing an efficient and adaptable IDS-based security system, addressing current cybersecurity challenges, and offering insights for future improvements in threat detection technologies. The findings highlight the importance of advanced IDS mechanisms in strengthening digital defense systems and protecting organizations from evolving cyber threats.
Downloads
References
Aldweesh, A., Derhab, A., & Emam, A. Z. (2020). Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems, 189, 105124.
Alkadi, O., Moustafa, N., & Turnbull, B. (2020). A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions. IEEE Access, 8, 104893–104917.
Amara, N., Zhiqui, H., & Ali, A. (2017). Cloud computing security threats and attacks with their mitigation techniques. 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 244–251.
Anwar, S., Mohamad Zain, J., Zolkipli, M. F., Inayat, Z., Khan, S., Anthony, B., & Chang, V. (2017). From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10(2), 39.
Benkhelifa, E., Welsh, T., & Hamouda, W. (2018). A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Communications Surveys & Tutorials, 20(4), 3496–3509.
Brown, B. C. (2011). How to Stop E-mail Spam, Spyware, Malware, Computer Viruses, and Hackers from Ruining Your Computer Or Network: The Complete Guide for Your Home and Work. Atlantic Publishing Company.
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211.
Dupont, B. (2019). The cyber-resilience of financial institutions: significance and applicability. Journal of Cybersecurity, 5(1), tyz013.
Elrawy, M. F., Awad, A. I., & Hamed, H. F. A. (2018). Intrusion detection systems for IoT-based smart environments: a survey. Journal of Cloud Computing, 7(1), 1–20.
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1–2), 18–28.
Hachmi, F., Boujenfa, K., & Limam, M. (2019). Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization. Journal of Network and Systems Management, 27, 93–120.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973–993.
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity, 2(1), 1–22.
Martin, K. D., Borah, A., & Palmatier, R. W. (2017). Data privacy: Effects on customer and firm performance. Journal of Marketing, 81(1), 36–58.
Neumann, P. G. (2000). Practical architectures for survivable systems and networks. Prepared by SRI International for the US Army Research Laboratory.
Patel, A., Qassim, Q., & Wills, C. (2010). A survey of intrusion detection and prevention systems. Information Management & Computer Security, 18(4), 277–290.
Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.
Rose, A., Oladosu, G., & Liao, S. (2007). Business interruption impacts of a terrorist attack on the electric power system of Los Angeles: customer resilience to a total blackout. Risk Analysis: An International Journal, 27(3), 513–531.
Sabillon, R., Cano, J. J., & Serra-Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 2016, 4 (6).
Singh, R., Kumar, H., Singla, R. K., & Ketti, R. R. (2017). Internet attacks and intrusion detection system: A review of the literature. Online Information Review, 41(2), 171–184.
Srinivas, J., Das, A. K., & Kumar, N. (2019). Government regulations in cyber security: Framework, standards and recommendations. Future Generation Computer Systems, 92, 178–188.
Wang, W., & Lu, Z. (2013). Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), 1344–1371.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Jonathan Demitrius

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

