Abstract

Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks for attacks or intrusions and report these intrusions to the administrator in order to take evasive action. Today computers are part of networked; distributed systems that may span multiple buildings sometimes located thousands of miles apart. The network of such a system is a pathway for communication between the computers in the distributed system. The network is also a pathway for intrusion. This system is designed to detect and combat some common attacks on network systems. It follows the signature based IDs methodology for ascertaining attacks. A signature based IDS will monitor packets on the network and compare them against a database of signatures or attributes from known malicious threats. In this system the attack log displays the list of attacks to the administrator for evasive action. This system works as an alert device in the event of attacks directed towards an entire network.

Highlights

  • With the development of network technologies and applications, network attacks are greatly increasing both in number and severity

  • Symantec in a report uncovered that the number of fishing attacks targeted at stealing confidential information such as credit card numbers, passwords, and other financial information are on the rise,.One solution to this is the use of network intrusion detection attacks by observing various network activities

  • It involves a count of packets from a 22 | P a g e particular target or a particular source or destination port or it may even be modeled with the help of other details in the packet such as header size, Time to Live (TTL), flag bits, protocol. 2.2.3 Identification of attacks This involves extracting useful information from captured local traffic such as source and destination IP addresses, protocol type, header length, source and destination ports etc and compare these details with modeled attack signatures to determine if an attack has occurred. 2.2.4 Reporting attack details This involves reporting the attack to the administrator so that he may take evasive action

Read more

Summary

INTRODUCTION

With the development of network technologies and applications, network attacks are greatly increasing both in number and severity. Main purpose of IDS is to find out intrusions among normal audit data and this can be considered as classification problem. Intrusion detection systems (IDS) are an effective security technology, which can detect, prevent and possibly react to the attack. It performs monitoring of target sources of activities, such as audit and network traffic data in computer or network systems, requiring security measures, and employs various techniques for providing security services. This paper presents the scope and status of our research in misuse detection Experimental results have demonstrated that this model is much more efficient in the detection of network intrusions, compared with network based techniques. Provides the concluding remarks and future scope of the work

NETWORKING ATTACKS
Pre intrusion activities
Packet Sniffer
Determination of attack signatures
Experimental Results
CONCLUSION
REFRENCES:
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call