EUDIS-An Encryption Scheme for User-Data Security in Public Networks

The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.





References:
[1] D.J. Day and Z. Zhao, "Protecting Against Address Space Layout
Randomization (ASLR) Compromises and Return-to-Libc Attacks
Using Network Intrusion Detection Systems.," International Journal of
Automation and Computing, vol. 8, no. 4, pp. 472-483, Dec. 2011.
[2] W. R. Cheswick, S. M. Bellovin, and A.D. Rubin, "Intrusion Detection,"
in Firewalls and Internet Security: Repelling the Wily Hacker, 2nd ed.
Boston: Addison-Wesley, 2003, pp. 279-283.
[3] Ryan Trost, "Intrusion Detection Systems," in Practical Intrusion
Analysis: Prevention and Detection for the Twenty-First Century, Karen
Gettman, Ed. Boston, USA: Addison-Wesley, 2010, ch. 3, pp. 53-85.
[4] P. M. Mafra, V.Moll, J. da Silva Fraga, and A.O.Santin, "Octopus-IIDS:
An Anomaly Based Intelligent Intrusion Detection System," in IEEE
Symposium on Computers and Communications, Riccione, Italy, 22-25
June 2010, pp. 405-410.
[5] S. Jajodia, Intrusion Detection Systems, R.Di Pietro and L.V. Mancini,
Eds. New York, US: Springer, 2008.
[6] W.Li, Z.Li, H.Shi, and W.Li, "A Novel Intrusion Detection System for
E-Commerce System," in International Conference on Management of e-
Commerce and e-Government, Nanchang, China, 16-19 September
2009, p. 454.
[7] Z.Trabelsi and R.Mahdy, "An Anomaly Intrusion Detection System
Employing Associative String Processor," in Ninth International
Conference on Networks, Menuires, France, 11-16 April 2010, p. 220.
[8] C.C.Lo, C.C.Huang, and J.Ku, "A Cooperative Intrusion Detection
System Framework for Cloud Computing Networks," in 39th
International Conference on Parallel Processing Workshops, San Diego,
USA, 13-16 September 2010, p. 281.
[9] J.Yang, X.Chen, X.Xiang, and J.Wan, "HIDS-DT: An Effective Hybrid
Intrusion Detection System Based on Decision Tree," in International
Conference on Communications and Mobile Computing, Shenzhen,
China, 12-14 April 2010, p. 70.
[10] J.Mallery et al., "Intrusion Detection and Response," in Hardening
Network Security, Jane K. Brownlow, Ed. Emeriville: McGraw-HIll,
2005, pp. 365-386.
[11] E.Flior et al., "A Knowledge-Based System Implementation of Intrusion
Detection Rules," in IEEE Seventh International Conference on
Information Technology, Las Vegas, USA, 12-14 April 2010, pp. 738-
739.
[12] S.Ohtahara, T.Kamiyama, and Y.Oyama, "Anomaly-based Intrusion
Detection System Sharing Normal Behavior Databases among Different
Machines," in Ninth IEEE International Conference on Computer and
Information Technology, Xiamen, China, 11-14 October 2009, pp. 217-
219.
[13] D.L. Prowse, "Computer Security," in CompTIA Security+ SY0-201
Cert Guide. Indianapolis, USA: Pearson Certification, 2011, ch. 2, p. 35.
[14] L.Gui-Xiang and G.Wei-Min, "Research on Network Security System
Based on intrusion Detection," in International Conference on EBusiness
and E-Government, Guangzhou, China, 7-9 May 2010, p.
2096.
[15] F.Haddadi, S.Khanchi, M.Shetabi, and V.Derhami, "Intrusion Detection
and Attack Classification Using Feed-Forward Neural Network," in
Second International Conference on Computer and Network
Technology, Bangkok, Thailand, 23-25 April 2010, p. 262.