Preview

Intrusion Detection System

Powerful Essays
Open Document
Open Document
10579 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Intrusion Detection System
1
[pic]
INTRUSION DETECTION SYSTEM Report submitted in partial fulfillment of the requirement for the degree of Bachelor of Technology
In
Computer Science and Engineering

Under the Supervision of
Mr. Pramod Parashar
By
Vishal Garg
01016403209

University School of Information Technology
Guru Gobind Singh Indraprastha University
Sector 16-C, Dwarka, Delhi JULY 2012

DECLARATION This is to declare that this Report entitled “Intrusion Detection System “which is submitted by me in partial fulfillment of the requirement for the award of degree B.Tech. In Computer Science and Engineering to USIT, GGSIP University, Delhi comprises only my original work and due acknowledgement has been made in the text to all other material used. I further declare that this work has not been submitted to any other Institute/University for the award of any degree.

Date: 27/07/2012 Vishal Garg B.Tech (CSE) 01016403209

CERTIFICATE This is to certify that Report entitled “Intrusion Detection System” which is submitted by Vishal Garg in partial fulfillment of the requirement for the award of degree B.Tech. In Computer Science and Engineering to USIT, GGSIP University, Delhi is a record of the candidate own work carried out by him under my supervision. The matter embodied in this Report is original and has not been submitted for the award of any other degree. Date: 21/07/2012 Supervisor Mr. Pramod Parashar

ACKNOWLEDGEMENT I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully.

First of all, I would like to thank Mr. Vipin Tyagi (Director, C-DOT) for creating opportunities to

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Shaw, R. (2009). Intrusion prevention systems market trends. Faulkner Information Services. Retrieved September 22, 2009, from…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Another important security feature for routers and switches are the extended access list (ACLs), which is a rule and must be implemented to control/filter the network traffic from the un-trusted networks. “You can use access lists to restrict contents of routing updates or to provide traffic flow control, One of the most important reasons to configure access lists is to provide security for your network.” [2] The switching device which is a layer 2, have several ports, are proposed to shut down all unused ports and use MAC addresses to avoid any access point (AP) placement. In the proposed Gliffy network diagram, an Intrusion Detection System (IDS) is depicted. "An IDS is a special network device that can detect attacks and suspicious activities." [4] It will just detect threats and will not take any action to stop the attack. It will be accounting firm's analyst responsibility to monitor the logs and interpret them correctly for the false and real time…

    • 940 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ap chem lab

    • 909 Words
    • 4 Pages

    Introduction: According to the Bohr atomic model, electrons orbit the nucleus in fixed paths with specific energies. Each path is therefore often referred to as an “energy level”. Electrons possessing the lowest energy are found in the levels closest to the nucleus. Electrons of higher energy are located in progressively more distant energy levels.…

    • 909 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The signature based technique is easier for deployment, since it does not need to learn the environment[5]. It is very effective against known attacks, but it cannot detect new intrusions until it is updated with the new signatures on its database.Therefore, they are easy to evade and can be easily bypassed by intruders by modifying known attack signatures and also target systems, that are not updated with new signatures that detect the modification. The architecture shown in Fig.1, uses the preprocessing to evaluate the signature and compare those signatures to the known signatures in the database. If there is a match then alert is issued, else the detection system does…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    effective a baseline installation of the Operating System is required. With the use of In-…

    • 885 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Gandhi, M. , & Srivatsa, S. Detecting and preventing attacks using network intrusion. International Journal of Computer Science and Security, 2(1), 49-60. Retrieved , from http://www.cscjournals.org/csc/manuscript/Journals/IJCSS/Volume2/Issue1/IJCSS-28.pdf…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Business

    • 2429 Words
    • 10 Pages

    Intrusion detection is a process that involves monitoring of the events taking place around and within the boundaries of the property. These events are monitored…

    • 2429 Words
    • 10 Pages
    Better Essays
  • Good Essays

    In 1921 the Orleans Parish Juvenile Court came into existence through the Louisiana Constitution. When the Juvenile Court was first established it started with one Judge but with an increase in juvenile crimes, the city chose to increase the number of judges in the courts. As of today there are a total of five judges that handle juvenile cases. Four of the judges primarily deal with adjudication. Adjudication is defined by the act of the court making an order or judgment. The fifth judge deals with family cases as it relates to child abuse and adoption and cases related to Department of Children Family Services (DCFS).…

    • 690 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Chen, T. & Walsh, P. J. (2009). Guarding Against Network Intrusions. In J. R. Vacca Computer and Information Security Handbook. Amsterdam: Elsevier.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    In other words best-practice security isn 't just good business sense; in some cases, it 's also the law. Legal requirements are vary between specific industries and different jurisdictions. For example, the Health Insurance Portability and Accountability…

    • 2543 Words
    • 11 Pages
    Powerful Essays