Intrusion Detection System

Submitted by: Submitted by

Views: 388

Words: 3678

Pages: 15

Category: Science and Technology

Date Submitted: 05/18/2012 04:41 AM

Report This Essay

Assignment Cover Sheet

Faculty of Science and Technology

NAME: Ashwath Mopathi

ASSIGNMENT/PRAC NAME: INTRUSION DETECTION SYSTEMS

Table of Contents

Abstract ……………………………………………………………………………………………………….. 1

Back Ground………………………………………………………………………………………………….. 1

Overview of Intrusion Detection System……………………………………………………….. 3

Challenges to intrusion detection systems……………………………………………………… 5

Types of Intrusion Detection Systems……………………………………………………………. 7

Techniques of Intrusion Detection Systems ………………………………………………..… 10

Classification of IDS on different Criteria…………………………………………………….... 11

Conclusion………………………………………………………………………………………………….…. 14

References………………………………………………………………………………………………….…. 15

ASHWATH MOPATHI

Student id: 212056365

ABSTRACT:

This paper examines different techniques for providing adaptation in intrusion detection systems .As attacks are growing in vast day by day they are in need of intrusion detection system and intrusion prevention system. In to protect software against malicious Activity, Organizations are required to monitor the activities IDS are the monitor tools in this generation to detect the threats and unusual activities

The ubiquitous use of computers and worldwide connectivity in today’s society has made computer security an international priority. Vast usage of network causes potential damage that can be initiated by remote person (hacker) over network

BACKGROUND:

An intruder has different innovative techniques to hack a network. Intruder is something or somebody (hacker) gains an entry to your system and can reflect something severe as stealing confidential data .an entity accessing the computer system without authorization or who have an legitimate access but r attempting to abuse their privileges[9]. An intrusion can be a set of actions that causes threats to organization security (Confidentiality, Integrity, Availability)

Intrusion prevention system[IPS] are the active defense...