Preview

Xray (an Intrusion Detection System)

Good Essays
Open Document
Open Document
6146 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Xray (an Intrusion Detection System)
Synopsis of XRAY
(An Intrusion Detection System)

Bachelor of Technology
In
Information Technology

Under the guidance of
Mr. Pinaki Chatopadhya
Lecturer
Department of Computer Science and Engg.

Submitted by Balgovind 0609113028 Gaurav Kapoor 0609113039 Javed Ansari 0609113046 Mayank Mehrotra 0609113061

Department of Information Technology
JSS Academy Of Technical Education
Noida
(2009-2010)

TABLE OF CONTENTS

Title Page……………………………… Page i Table of contents………………………. Page ii
Motivation……………………………… 3
Project Objective………………………. 4
Scope of the project……………………. 5
Fig 1: Pert Chart………………………… 6
Fig 2: Gantt Chart………………………. 7
Technical Feasibility……………………. 8
References………………………………. 10
APPENDIX I……………………………. 11
AAPENDIX II…………………………... 12

MOTIVATION

Intrusion detection is defined to be the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are exceeding their privileges (i.e., the insider threat). Work is being done elsewhere on Intrusion Detection Systems (IDS’s) for a single host and for several hosts connected by a network . The proliferation of heterogeneous computer networks has serious implications for the intrusion detection problem. Foremost among these implications is the increased opportunity for unauthorized access that is provided by the network’s connectivity. This problem is exacerbated when dial-up or internetwork access is allowed, as well as when unmonitored hosts (viz. hosts without audit trails) are present. The use of distributed rather than centralized computing resources also implies reduced control over those resources. Moreover, multiple independent computers are likely to generate more audit data than a single computer, and this audit data is dispersed among the various systems.
Clearly, not all of the audit data can be forwarded to



References: 7. Teresa F Lunt. Detecting Intruders in Computer Systems. Conference on Auditing and Computer Technology, 1993. 8

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    An IDS is a software or hardware tool which allows to detect and warn about an attack or…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The SANS Institute (2012). Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment: http://www.sans.org/reading-room/whitepapers/detection/logging-monitoring-detect-network-intrusions-compliance-violations-environment-33985…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Sommer, R. (2009, July). An architecture for exploiting multi-core processors to parallelize network intrusion prevention..Concurrency & Computation: Practice & Experience, 21(10)…

    • 722 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Honeypots

    • 7197 Words
    • 29 Pages

    The Internet is growing fast and doubling its number of websites every 53 days and the number of people using the internet is also growing. Hence, global communication is getting more important every day. At the same time, computer crimes are also increasing. Countermeasures are developed to detect or prevent attacks - most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism; but is there enough information about the enemy?…

    • 7197 Words
    • 29 Pages
    Good Essays
  • Powerful Essays

    Virtualization

    • 3094 Words
    • 9 Pages

    Shou, T. S. (2011). Development of an intrusion detection and prevention course project using virtualization technology. International Journal of Education and Development using Information and Communication Technology, 7(2), 46-55.…

    • 3094 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Intrusion Detection

    • 403 Words
    • 2 Pages

    Contrary to that belief, however, is the obvious concept that, when an event occurs, there is a high probability that the IDS will be the only thing watching the network in significant enough detail to capture the event and any precursor events in their entirety. Thus, the application of the output of an IDS to the investigation and potential prosecution of an attack against computers on a network is of interest both to practitioners and to researchers.…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Cafe Management

    • 1462 Words
    • 6 Pages

    The system we propose has great scope in the current real time situation. The cyber crime monitoring system can be enhanced to an extent by implementing this system. Most of the firms and establishments are being computerized in order to ease the tasks to be performed. The internet cafés unfortunately are rarely computerized. We aim through this venture, a better reliable solution.…

    • 1462 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    management

    • 460 Words
    • 5 Pages

    programming and Oracle Developer 2000 for the GUI and the front end. It provided a…

    • 460 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    system security

    • 573 Words
    • 2 Pages

    • Masquerader: An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account…

    • 573 Words
    • 2 Pages
    Good Essays