
	<!DOCTYPE ArticleSet PUBLIC "-//NLM//DTD PubMed 2.0//EN" "http://www.ncbi.nlm.nih.gov:80/entrez/query/static/PubMed.dtd">
	<ArticleSet>

	<Article> 

	<Journal> 

	<PublisherName>International Science Community Association</PublisherName>

	<JournalTitle>Research Journal of Engineering Sciences</JournalTitle> 

	<Issn>2278 - 9472</Issn>

	<Volume>1</Volume>

	<Issue>1</Issue>

	<PubDate PubStatus="ppublish"> 

	<Year>2012</Year> 

	<Month>07</Month> 

	<Day>26</Day> 

	</PubDate>

	</Journal>



	<ArticleTitle>Intrusion Detection and Prevention System (IDPS) Technology- Network Behavior Analysis System (NBAS)</ArticleTitle> 


	<FirstPage>51</FirstPage>

	<LastPage>56</LastPage>



	<ELocationID EIdType="pii"></ELocationID>

	<Language>EN</Language> 
	<AuthorList>

	
		<Author> 

		<FirstName>D.P</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Deshpande </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Dept of Chemical Engineering, TKIET, Warananagar, MS, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>S.S.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Haral </LastName>

		<Suffix>2</Suffix>

		<Affiliation>Dept. of Chemical Engineering, Govt. Polytechnic, Jalna, MS, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>S.S.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Gandhi </LastName>

		<Suffix>3</Suffix>

		<Affiliation>Dept of Chemical Engineering, MIT, Alandi, Pune, MS, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>V.N. </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Ganvir </LastName>

		<Suffix>4</Suffix>

		<Affiliation>Dept, of Petrochemical Technology, LIT, Nagpur, MS, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Vaibhav V.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Prakash </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Kutnikar  </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Ajay L. </LastName>

		<Suffix>2</Suffix>

		<Affiliation>Department of Computer Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysore, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Tushar S.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Patel </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Computer Engineering Department, UVPCE, Kherva, Gujarat, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Kiran R.  </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Amin </LastName>

		<Suffix>2</Suffix>

		<Affiliation>Computer Engineering Department, UVPCE, Kherva, Gujarat, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>U.C.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Roman </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Sardar Vallabhai National Institute of Technology, Surat 395007, INDIA </Affiliation>

		</Author>
		<Author> 

		<FirstName> P.D.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Porey</LastName>

		<Suffix>2</Suffix>

		<Affiliation>Sardar Vallabhai National Institute of Technology, Surat 395007, INDIA </Affiliation>

		</Author>
		<Author> 

		<FirstName>P.L.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Patel </LastName>

		<Suffix>3</Suffix>

		<Affiliation>Sardar Vallabhai National Institute of Technology, Surat 395007, INDIA </Affiliation>

		</Author>
		<Author> 

		<FirstName>N. </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Vivekanandan </LastName>

		<Suffix>4</Suffix>

		<Affiliation>Central Water and Power Research Station, Pune 411024, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Sanjay</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Purkar T. </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Swami Vivekanand College of Engineering, Indore MP, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName> Sunil </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Pathak</LastName>

		<Suffix>2</Suffix>

		<Affiliation>Swami Vivekanand College of Engineering, Indore MP, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Sanjay Kumar  </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Dubey </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Dept. of Civil Engineering, Jabalpur Engineering College, Jabalpur INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Ahmad </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Khaleek</LastName>

		<Suffix>1</Suffix>

		<Affiliation>Structural Engineering, Jabalpur Engineering College, Jabalpur, MP, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>R.K.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Yadav </LastName>

		<Suffix>2</Suffix>

		<Affiliation>Department of Civil Engineering, Jabalpur Engineering College, Jabalpur, MP, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Rajeev </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Chandak </LastName>

		<Suffix>3</Suffix>

		<Affiliation>Department of Civil Engineering, Jabalpur Engineering College, Jabalpur, MP, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>M.P.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Aina </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Lab. des Sciences et Techniques de l’Eau de l’Ecole Polytechnique d’Abomey Calavi, UAC, Cotonou, BENIN and Lab. d’Etude et de Recherche en Chimie Appliquée, Ecole Polytech. d’Abomey/Calavi, UAC, Cotonou, BENIN</Affiliation>

		</Author>
		<Author> 

		<FirstName> B.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Djihouessi</LastName>

		<Suffix>2</Suffix>

		<Affiliation>Lab. des Sciences et Techniques de l’Eau de l’Ecole Polytechnique d’Abomey Calavi, UAC, Cotonou, BENIN </Affiliation>

		</Author>
		<Author> 

		<FirstName>E.W.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Vissin </LastName>

		<Suffix>3</Suffix>

		<Affiliation>Lab. Pierre Pagney, Climat, Eau, Environ., Dévelopement (LACEEDE) /DGAT/FLASH, Université d’Abomey-Calavi, BENIN</Affiliation>

		</Author>
		<Author> 

		<FirstName>N.M.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Kpondjo </LastName>

		<Suffix>4</Suffix>

		<Affiliation>Lab. des Sciences et Techniques de l’Eau de l’Ecole Polytechnique d’Abomey Calavi, UAC, Cotonou, BENIN </Affiliation>

		</Author>
		<Author> 

		<FirstName>V.</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Gbèdo </LastName>

		<Suffix>5</Suffix>

		<Affiliation>Lab. des Sciences et Techniques de l’Eau de l’Ecole Polytechnique d’Abomey Calavi, UAC, Cotonou, BENIN </Affiliation>

		</Author>
		<Author> 

		<FirstName>K.C.D </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Sohounhloué </LastName>

		<Suffix>6</Suffix>

		<Affiliation>Lab. d’Etude et de Recherche en Chimie Appliquée, Ecole Polytech. d’Abomey/Calavi, UAC, Cotonou, BENIN</Affiliation>

		</Author>
		<Author> 

		<FirstName>Nitin</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Tiwari </LastName>

		<Suffix>1</Suffix>

		<Affiliation>Singhania University, Jhunjhunu, Rajasthan, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Rajdeep Singh</FirstName>

		<MiddleName> </MiddleName>

		<LastName>Solanki </LastName>

		<Suffix>2</Suffix>

		<Affiliation>Singhania University, Jhunjhunu, Rajasthan, INDIA</Affiliation>

		</Author>
		<Author> 

		<FirstName>Gajaraj Singh  </FirstName>

		<MiddleName> </MiddleName>

		<LastName>Pandya </LastName>

		<Suffix>3</Suffix>

		<Affiliation>Singhania University, Jhunjhunu, Rajasthan, INDIA</Affiliation>

		</Author>

	<Author>

	<CollectiveName></CollectiveName>>

	</Author>

	</AuthorList>


	<PublicationType>Research Paper</PublicationType>


	<History>  
	<PubDate PubStatus="received">
	<Year>2012</Year>
	<Month>7</Month>
	<Day>11</Day>
	</PubDate>
	<PubDate PubStatus="accepted">										
	<Year>2012</Year> 
	<Month>07</Month>									
	<Day>26</Day> 
	</PubDate>

	</History>
	<Abstract>Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization. In this paper we discuss the one technology of IDPS named network behavior analysis system. A network behavior analysis system (NBAS) is basically an IDPS (intrusion detection and prevention system) technology which examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations, In this paper we provides a detailed discussion of NBA technologies. First, it covers the major components of the NBA technologies and explains the architectures typically used for deploying the components. It also examines the security capabilities of the technologies in depth, including the methodologies they use to identify suspicious activity. The rest of the part discusses the management capabilities of the technologies, including recommendations for implementation and operation.</Abstract>

	<CopyrightInformation>Copyright@ International Science Community Association</CopyrightInformation>

	<ObjectList> 
	<Object Type="keyword">
	<Param Name="value"></Param>
	</Object>

	</ObjectList>	

	</Article>

	</ArticleSet>
	