72760909 Intrusion Detection System by 8289566Y


									      Intrusion Detection System

Group Members:     Pramit Mishra

                   Nikhil Sharma
                   Prakhar S. Chauhan
                   Mayank Atri

GUIDE: ______________________

Project In-Charge:__________________
         TITLE: Intrusion Detection System

 “Intrusion detection systems (IDSs) are hardware or software systems that automate the
process of monitoring the events occurring in a computer system or network, analyzing them
for signs of security problems”.An Intrusion detection system (IDS) is software and/or hardware
designed to detect unwanted attempts at accessing, manipulating, and/or disabling
of computer systems, mainly through a network, such as the Internet. An intrusion detection
system is used to detect several types of malicious behaviors that can compromise the security
and trust of a computer system. This includes network attacks against vulnerable services, data
driven attacks on applications, host based attacks such as privilege escalation, unauthorized
logins and access to sensitive files, and malware (viruses, trojan horses, and worms).

Resources Used:
Language used – Java

Database – MS Access

Platform - Textpad

Other specifications – Microsoft XP OS, Java version 1.5.0

Intrusion Detection can be defined as "the act of detecting actions that attempt to compromise
the confidentiality, integrity or availability of a resource." More specifically, the goal of intrusion
detection is to identify entities attempting to subvert in-place security controls. Intrusion -
detection systems typically are passive systems that simply detect problems and perhaps alert
someone. They do not block any traffic, or take active measures to stop an attack. A properly
configured firewall can allow only certain types of traffic to pass, thus protecting the internal
network from any number of malicious activities

To top