Login to Your Account

Results 1 to 2 of 2

Thread: Intrusion Detection System Using Rule-Based PPT PDF Paper Presentation & Seminar Repo

  1. #1

    Pdf 32 Intrusion Detection System Using Rule-Based PPT PDF Paper Presentation & Seminar Repo

    Intrusion Detection System Using Rule-Based Paper Presentation & Seminar

    In recent years, Intrusion Detection System has become one of the hottest research areas in Computer Security. It is an important detection technology and is used as a countermeasure to preserve data integrity and system availability during an intrusion. When an intruder attempts to break into an information system or performs an action not legally allowed, we refer to this activity as an intrusion. Intruders can be divided into two groups, external and internal. The former refers to those who do not have authorized access to the system and who attack by using various penetration techniques. The latter refers to those with access permission who wish to perform unauthorized activities. Intrusion techniques may include exploiting software bugs and system misconfigurations, password cracking, sniffing unsecured traffic, or exploiting the design flaw of specific protocols. An Intrusion Detection System is a system for detecting intrusions and reporting them accurately to the proper authority.

    There are two generally accepted categories of intrusion detection techniques: misuse detection and anomaly detection. Misuse detection refers to techniques that characterize known methods to penetrate a sys tem. These penetrations are characterized as a 'pattern' or a 'signature' that the IDS looks for. The pattern/signature might be a static string or a set sequence of actions. System responses are based on identified penetrations. Anomaly detection refers to techniques that define and characterize normal or acceptable behaviors of the system.

    Please find the attached file along with this

    If You have any query regarding the files.Please feel free to ask .I'll be glad to answer them

    Attached Files for Direct Download
      File Name:
      File Size:
      169.4 KB
      Total Downloads:
    * Click on the 'file icon' or 'file name' to start downloading

  2. #2

    Re: Intrusion Detection System Using Rule-Based PPT PDF Paper Presentation & Seminar

    hey thr r two types of ids misuse/signature based and anamoly/behavior based......

    now if we want to make a hybrid ids(wich hv properties of both)

    thn,, cn u plz help me how we cn implement it.......

    ny idea...

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

Share anywhere and get download.