New architecture of system intrusion detection and prevention

Mariusz Nycz, Mirosław Hajder, Alicja Gerka


In this article there has been presented new intrusion detection and prevention algorithm implemented on Raspberry Pi platform. The paper begins with the presentation of research methodology in the field of Intrusion Detection Systems. Adequate supervision and control over network traffic is crucial for the security of information and communication technology. As a result of the limited budget allocated for the IT infrastructure of small businesses and the high price of dedicated solutions, many companies do not use mentioned systems. Therefore, in this order, there has been proposed monitoring solution based on the generally available Raspberry Pi platform. The paper is addressed to network administrators.


intrusion detection; network security; IDS; IPS

Full Text:



E. Denning D., "An intrusion-detection model ," IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 13, no. 2, pp. 222-232, 1987.

S. Axelsson, "Research in Intrusion-Detection Systems," Göteborg, 1998.

H. Debar, M. Dacier, and A. Wespi, "Towards a Taxonomy of Intrusion-Detection Systems ," Rüschlikon, 1998.

A. Lazarevic, V. Kumar, and J. Srivastava, Intrusion detection: A survey. Minneapolis: Computer Science Department, University of Minnesota, 2005.

Z. Zhou, L. Liu, and G. Han, "Survival Continuity on Intrusion Detection System of Wireless Sensor Networks," in International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Kraków, 2015, pp. 775-779.

D. W. Straub, S. Goodman, and R. L. Baskerville, Information Security. Policy, Process and Practices. London: M.E. Sharpe, 2008.

H. F. Tipton and M. Krause, Information Security Management Handbook, 6th ed. Boca Raton: CRC Press, 2012.

J. S. Tiller R. O’Hanley, Information Security Management Handbook. Boba Raton, USA: CRC Press, 2014.

M. Hajder, P. Hajder, and M. Nycz, "Inteligentna analiza danych jako metoda detekcji ataków na sieci," in Innowacyjna gmina. Bezpieczeństwo i ekologia. Rzeszów: Wyższa Szkoła Informatyki i Zarządzania z siedzibą w Rzeszowie, 2013, pp. 7-25.

M. Stamp, Information Security: Principles and Practice, 2nd ed. New York: Wiley & Sons, 2011.

T. R. Peltier, Information security policies and procedures : a practitioner’s references. Boca Raton: CRC Press, 1998.

A. Laukaitis and O. Vasilecas, "Formal concept analysis and information systems modeling," in Proceedings of the 2007 international conference on Computer systems and technologies, Burgas, Bulgaria, 2007, pp. 1-6.

G. Marakas and J. A. O'Brien, Introduction to Information Systems, 16th ed. New York, NY: McGraw-Hill, 2013.

W. R. Bitman, "Information systems modeling: an object oriented development method," in Proceedings of the ninth Washington Ada symposium on Ada: Empowering software users and developers, McLean, Virginia, USA, 1992, pp. 93-105.

R. Bejtlich, Practice Of Network Security Monitoring. San Francisco, USA: no starch press, 2013.

Data publikacji: 2017-12-22 09:38:06
Data złożenia artykułu: 2017-12-22 09:11:18


  • There are currently no refbacks.

Copyright (c) 2017 Mariusz Nycz, Mirosław Hajder, Alicja Gerka

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.