Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Post: #1

Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level. Intrusion detection systems fall into two basic categories: signature-based intrusion detection systems and anomaly detection systems. Intruders have signatures, like computer viruses, that can be detected using software. You try to find data packets that contain any known intrusion-related signatures or anomalies related to Internet protocols. Based upon a set of signatures and rules, the detection system is able to find and log suspicious activity and generate alerts. Anomaly-based intrusion detection usually depends on packet anomalies present in protocol header parts. In some cases these methods produce better results compared to signature-based IDS. Usually an intrusion detection system captures data from the network and applies its rules to that data or detects anomalies in it. Snort is primarily a rule-based IDS, however input plug-ins are present to detect anomalies in protocol headers.

Snort uses rules stored in text files that can be modified by a text editor. Rules are grouped in categories. Rules belonging to each category are stored in separate files. These files are then included in a main configuration file called snort.conf. Snort reads these rules at the start-up time and builds internal data structures or chains to apply these rules to captured data. Finding signatures and using them in rules is a tricky job, since the more rules you use, the more processing power is required to process captured data in real time. It is important to implement as many signatures as you can use few rules as possible. Snort comes with a rich set of pre-defined rules to detect intrusion activity and you are free to add your own rules at will. You can also remove some of the built-in rules to avoid false alarms.

Here I describe intrusion detection, related terminology, installation and management of Snort as well as other products that work with Snort. These products include the database and Analysis Control for Intrusion Database (ACID). Snort has the capability to log data collected (such as alerts and other log messages) to a database. MySQL is used as the database engine where all of this data is stored. Using Apache web server and ACID, you can analyze this data. A combination of Snort, Apache, Myself, and ACID makes it possible to log the intrusion detection data into a database and then view and analyze it later, using a web interface.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: intrusion detection devices, source code for snort tool in java, intrusion by denise levertov, snort intrusion detection system, snort projects in java, intrusion detection introduction, graham 2002 intrusion detection,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Landmine detection using impulse ground penetrating radar electronics seminars 18 14,883 15-08-2014 01:57 PM
Last Post: Guest
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 66 29,802 01-08-2014 09:47 PM
Last Post: seminar report asees
  Earthquake Detection Using FM Radio Aditi paliwal 4 3,568 07-03-2013 11:14 AM
Last Post: Guest
  mobile fraud detection full report project topics 7 5,628 03-03-2013 02:22 PM
Last Post: Guest
  Landmine Detection Using Impulse Ground Penetrating Radar jadunath murmu 15 8,283 04-02-2013 02:54 PM
Last Post: seminar details
  Landmine Detection Using Impulse Ground Penetrating Radar computer science crazy 1 1,224 17-12-2012 02:48 PM
Last Post: seminar details
  Digital image watermarking capacity and detection error rate computer science crazy 1 1,793 20-10-2012 01:27 PM
Last Post: seminar details
  Spectrum sensing based on energy detection smart paper boy 1 2,191 03-10-2012 12:46 PM
Last Post: seminar details
  Embedded system for biometric identification based on iris detection computer girl 0 667 11-06-2012 10:29 AM
Last Post: computer girl
Last Post: computer girl