The thesis analyzes the ways of IDS which stands for Intrusion Detection System works. The basic ... more The thesis analyzes the ways of IDS which stands for Intrusion Detection System works. The basic aim of an Intrusion Detection System is to protect a computer network or system from unauthorized access of attacks. Different types of IDS are also compared and criticized in this thesis which explore the vulnerability of the system. Different detection techniques have been discussed on network based IDS. The study has been done on the operational procedures of Network based open source IDS tool Snort. It is a lightweight network based intrusion detection system, which read every incoming/outgoing packets through a network and alert the admin accordingly. To check every packets, Snort use a central database system of signature. Here in this paper a layered database system has been proposed to upgrade the system performance. An analytical operation has been conveyed on the proposed solution and compared with the existing standard system. Future scopes, further development, pros and cons also have been discussed.
The thesis analyzes the ways of IDS which stands for Intrusion Detection System works. The basic ... more The thesis analyzes the ways of IDS which stands for Intrusion Detection System works. The basic aim of an Intrusion Detection System is to protect a computer network or system from unauthorized access of attacks. Different types of IDS are also compared and criticized in this thesis which explore the vulnerability of the system. Different detection techniques have been discussed on network based IDS. The study has been done on the operational procedures of Network based open source IDS tool Snort. It is a lightweight network based intrusion detection system, which read every incoming/outgoing packets through a network and alert the admin accordingly. To check every packets, Snort use a central database system of signature. Here in this paper a layered database system has been proposed to upgrade the system performance. An analytical operation has been conveyed on the proposed solution and compared with the existing standard system. Future scopes, further development, pros and cons also have been discussed.
Uploads
Drafts by Noor Farjana
Different types of IDS are also compared and criticized in this thesis which explore the vulnerability of the system. Different detection techniques have been discussed on network based IDS. The study has been done on the operational procedures of Network based open source IDS tool Snort. It is a lightweight network based intrusion detection system, which read every incoming/outgoing packets through a network and alert the admin accordingly. To check every packets, Snort use a central database system of signature.
Here in this paper a layered database system has been proposed to upgrade the system performance. An analytical operation has been conveyed on the proposed solution and compared with the existing standard system. Future scopes, further development, pros and cons also have been discussed.
Different types of IDS are also compared and criticized in this thesis which explore the vulnerability of the system. Different detection techniques have been discussed on network based IDS. The study has been done on the operational procedures of Network based open source IDS tool Snort. It is a lightweight network based intrusion detection system, which read every incoming/outgoing packets through a network and alert the admin accordingly. To check every packets, Snort use a central database system of signature.
Here in this paper a layered database system has been proposed to upgrade the system performance. An analytical operation has been conveyed on the proposed solution and compared with the existing standard system. Future scopes, further development, pros and cons also have been discussed.