(An Intrusion Detection System)
Bachelor of Technology
In
Information Technology
Under the guidance of
Mr. Pinaki Chatopadhya
Lecturer
Department of Computer Science and Engg.
Submitted by Balgovind 0609113028 Gaurav Kapoor 0609113039 Javed Ansari 0609113046 Mayank Mehrotra 0609113061
Department of Information Technology
JSS Academy Of Technical Education
Noida
(2009-2010)
TABLE OF CONTENTS
Title Page……………………………… Page i Table of contents………………………. Page ii
Motivation……………………………… 3
Project Objective………………………. 4
Scope of the project……………………. 5
Fig 1: Pert Chart………………………… 6
Fig 2: Gantt Chart………………………. 7
Technical Feasibility……………………. 8
References………………………………. 10
APPENDIX I……………………………. 11
AAPENDIX II…………………………... 12
MOTIVATION
Intrusion detection is defined to be the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are exceeding their privileges (i.e., the insider threat). Work is being done elsewhere on Intrusion Detection Systems (IDS’s) for a single host and for several hosts connected by a network . The proliferation of heterogeneous computer networks has serious implications for the intrusion detection problem. Foremost among these implications is the increased opportunity for unauthorized access that is provided by the network’s connectivity. This problem is exacerbated when dial-up or internetwork access is allowed, as well as when unmonitored hosts (viz. hosts without audit trails) are present. The use of distributed rather than centralized computing resources also implies reduced control over those resources. Moreover, multiple independent computers are likely to generate more audit data than a single computer, and this audit data is dispersed among the various systems.
Clearly, not all of the audit data can be forwarded to
References: 7. Teresa F Lunt. Detecting Intruders in Computer Systems. Conference on Auditing and Computer Technology, 1993. 8