Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Intrusion Detection System

Intrusion Detection System

Ratings: (0)|Views: 868|Likes:
Published by Nand Lal

More info:

Categories:Topics, Art & Design
Published by: Nand Lal on Nov 23, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

11/15/2012

pdf

text

original

 
 
SEMINAR REPORT
ON
 
“ INTRUSION DETECTION SYSTEM 
SUBMITTEDBY 
SUMANTA KUMAR DASRegd No :0701218126 INFORMATION TECHNOLOGYPurushottam Institute Of Engg& Technlogy
ABSTRACT
 
An Intrusion Detection System (IDS) is a device or software application that monitorsnetwork and/or system activities for malicious activities or policy violations and producesreports to a Management Station. Intrusion prevention is the process of performingintrusion detection and attempting to stop detected possible incidents. Intrusion detectionand prevention systems (IDPS) are primarily focused on identifying possible incidents,logging information about them, attempting to stop them, and reporting them to securityadministrators. In addition, organizations use IDPSs for other purposes, such asidentifying problems with security policies, documenting existing threats, and deterringindividuals from violating security policies. IDPSs have become a necessary addition tothe security infrastructure of nearly every organization.iINTRUSION DETECTION SYSTEM
 
INTRUSION DETECTION SYSTEMABSTRACT……...………………………………………………………………………iACKNOWLEDGEMENT………………………………………………… …………...iiLIST OF FIGURES………………………………………………………………… iii1.INTRODUCTION……………………………………………………………………...12. Overview of digital image restoration……… …………..…………………………….22.1.What is intrusion ?............................………………………………………………..22.2. What is intrusion detection system…………………………. …………………….22.3. a brief history of IDS……………………………………………………………….22.4 Why should I use IDS? ..............................................................................................32.5Why should I use IDS I have a firewall……………………………………………...32.6 what an IDS can do for us? ………………………………………………………....42.8 IDS terminology……………………………………………………………………..43 types of IDS …………………………………………………………………………….53.1 Host based IDS ……………………………………………………………………...53.2 Network based IDS………………………………………………………………….73.3 Application based IDS……………………………………………………………....83.4 Other type of IDS…………………………………………………………………....94. General IDS with firewall…………………………………………………………….104.1 IDS and firewall……………………………………………………………………104.2 general network layout with firewall……………………………………………....125. Intrusion detection process……………………………………………………………145.1 Signature based IDS………………………………………………………………..14
TABLE OF CONTENTS

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->