Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Intrusion Detection Systems
Post: #1

Intrusion Detection Systems

The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. The individual creativity of attackers, the wide range of computer hardware and operating systems, and the ever changing nature of the overall threat to target systems have contributed to the difficulty in effectively identifying intrusions. While the complexities of host computers already made intrusion detection a difficult endeavor, the increasing prevalence of distributed network-based systems and insecure networks such as the Internet has greatly increased the need for intrusion detection.

There are two general categories of attacks which intrusion detection technologies attempt to identify - anomaly detection and misuse detection .Anomaly detection identifies activities that vary from established patterns for users, or groups of users. Anomaly detection typically involves the creation of knowledge bases that contain the profiles of the monitored activities.

The second general approach to intrusion detection is misuse detection. This technique involves the comparison of a user's activities with the known behaviors of attackers attempting to penetrate a system. While anomaly detection typically utilizes threshold monitoring to indicate when a certain established metric has been reached, misuse detection techniques frequently utilize a rule-based approach. When applied to misuse detection, the rules become scenarios for network attacks. The intrusion detection mechanism identifies a potential attack if a user's activities are found to be consistent with the established rules. The use of comprehensive rules is critical in the application of expert systems for intrusion detection.

Current approaches to intrusion detection systems

Most current approaches to the process of detecting intrusions utilize some form of rule-based analysis. Rule-Based analysis relies on sets of predefined rules that are provided by an administrator, automatically created by the system, or both. Expert systems are the most common form of rule-based intrusion detection approaches. The early intrusion detection research efforts realized the inefficiency of any approach that required a manual review of a system audit trail. While the information necessary to identify attacks was believed to be present within the voluminous audit data, an effective review of the material required the use of an automated system.

The use of expert system techniques in intrusion detection mechanisms was a significant milestone in the development of effective and practical detection-based information security systems.

An expert system consists of a set of rules that encode the knowledge of a human "expert". These rules are used by the system to make conclusions about the security-related data from the intrusion detection system. Expert systems permit the incorporation of an extensive amount of human experience into a computer application that then utilizes that knowledge to identify activities that match the defined characteristics of misuse and attack.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: intrusion detection systems ids, free intrusion detection systems downloads, misuse antonym, implement intrusion detection systems in cloudsim, misuse apostrophe, intrusion detection systems dod, intrusion detection systems government,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Landmine detection using impulse ground penetrating radar electronics seminars 18 14,882 15-08-2014 01:57 PM
Last Post: Guest
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 66 29,800 01-08-2014 09:47 PM
Last Post: seminar report asees
Information EMBEDDED SYSTEMS IN AUTOMOBILES seminar projects crazy 4 3,059 19-07-2013 10:44 AM
Last Post: computer topic
  Earthquake Detection Using FM Radio Aditi paliwal 4 3,567 07-03-2013 11:14 AM
Last Post: Guest
  mobile fraud detection full report project topics 7 5,626 03-03-2013 02:22 PM
Last Post: Guest
  Landmine Detection Using Impulse Ground Penetrating Radar jadunath murmu 15 8,280 04-02-2013 02:54 PM
Last Post: seminar details
  Embedded Systems In Automobiles computer science crazy 4 4,949 23-01-2013 09:13 PM
Last Post: Guest
  Maximum Power Point Tracking Controller for PV Systems using a PI Regulator project topics 1 2,095 19-01-2013 12:51 PM
Last Post: seminar details
  Smart Cameras in Embedded Systems computer science crazy 1 1,419 22-12-2012 12:04 PM
Last Post: seminar details
  Battery Free Embedded Systems full report computer science topics 1 1,717 22-12-2012 12:03 PM
Last Post: seminar details