Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Intrusion Detection System
Post: #1

Description : Many solutions have been arrived at in the past to counter the problem of intruders in a network among which Firewalls were predominantly ruling. However with rapid growth of the Internet, hackers and attackers are provided with the ability to inflict major damage to organizationâ„¢s vital data. Attackers are forever in the process of developing new tools to exploit applications necessary for an organization to maintain an Internet presence. As methods to overcome or exploit the firewall are employed by them, it becomes mandatory that more advanced and layered security technologies be employed to protect against hacker attacks. A technology that has gained momentum attention from industry analysts and trade media is Decoy-based intrusion protection, otherwise known as "Honey pot" technology. This technology is used to contain and control an attack and resembles deception techniques employed in warfare that divert enemies into attacking false troops or airfields. Systems here can defend against attacks on network assets from attackers raging a war on the enterprise for information. Honey pots were used by researchers and generally placed outside the firewall to discover hackers on a network system. Using Honeypots, researchers could study the tactics, tools, movements, and behavior of intruders. Today honeypots play an important part in enterprise security. This paper defines honeypots, describes their advantages, and outlines how they act as complementary components of an overall intrusion protection strategy.
Technologies : java ,Swing
Post: #2
plz send a full report to my email- fruit_ooi10[at] . thanks~

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  SUSPICIOUS EMAIL DETECTION seminar class 11 6,160 21-04-2016 11:16 AM
Last Post: dhanyavp
  DATA LEAKAGE DETECTION project topics 16 11,322 31-07-2015 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 1,996 26-05-2015 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 3,574 27-01-2015 12:09 AM
Last Post: Guest
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 17,764 04-09-2014 11:31 PM
Last Post: Charlescic
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 3,831 22-07-2013 09:37 PM
Last Post: Guest
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 5 6,355 24-06-2013 10:44 AM
Last Post: computer topic
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 2,096 26-04-2013 01:58 PM
Last Post: Guest
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 2,448 17-04-2013 11:37 PM
Last Post: [email protected]
  Fuzzy Impulse Noise Detection and Reduction project topics 1 1,343 05-12-2012 03:58 PM
Last Post: seminar details