INTRUSION DETECTION WITH SNORT
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP
**

Posts: 604
Joined: Dec 2008
#1
31-01-2009, 12:41 AM


Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level. Intrusion detection systems fall into two basic categories: signature-based intrusion detection systems and anomaly detection systems. Intruders have signatures, like computer viruses, that can be detected using software. You try to find data packets that contain any known intrusion-related signatures or anomalies related to Internet protocols. Based upon a set of signatures and rules, the detection system is able to find and log suspicious activity and generate alerts. Anomaly-based intrusion detection usually depends on packet anomalies present in protocol header parts. In some cases these methods produce better results compared to signature-based IDS. Usually an intrusion detection system captures data from the network and applies its rules to that data or detects anomalies in it. Snort is primarily a rule-based IDS, however input plug-ins are present to detect anomalies in protocol headers.

Snort uses rules stored in text files that can be modified by a text editor. Rules are grouped in categories. Rules belonging to each category are stored in separate files. These files are then included in a main configuration file called snort.conf. Snort reads these rules at the start-up time and builds internal data structures or chains to apply these rules to captured data. Finding signatures and using them in rules is a tricky job, since the more rules you use, the more processing power is required to process captured data in real time. It is important to implement as many signatures as you can use few rules as possible. Snort comes with a rich set of pre-defined rules to detect intrusion activity and you are free to add your own rules at will. You can also remove some of the built-in rules to avoid false alarms.

Here I describe intrusion detection, related terminology, installation and management of Snort as well as other products that work with Snort. These products include the database and Analysis Control for Intrusion Database (ACID). Snort has the capability to log data collected (such as alerts and other log messages) to a database. MySQL is used as the database engine where all of this data is stored. Using Apache web server and ACID, you can analyze this data. A combination of Snort, Apache, Myself, and ACID makes it possible to log the intrusion detection data into a database and then view and analyze it later, using a web interface.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 64 33,863 12-04-2016, 03:24 PM
Last Post: mkaasees
  power theft detection via plc pdf jaseelati 0 333 22-01-2015, 03:31 PM
Last Post: jaseelati
  network intrusion detection system project report doc jaseelati 0 366 13-01-2015, 01:15 PM
Last Post: jaseelati
  deadlock detection algorithm source code c jaseelati 0 272 10-01-2015, 02:18 PM
Last Post: jaseelati
  bomb detection robotics using embedded controller jaseelati 0 322 06-01-2015, 04:50 PM
Last Post: jaseelati
  network intrusion detection system project report jaseelati 0 245 23-12-2014, 03:08 PM
Last Post: jaseelati
  A MODERN MICROWAVE LIFE DETECTION SYSTEM FOR HUMAN BEING BURIED UNDER RUBBLE ppt seminar flower 3 1,715 28-08-2013, 09:31 AM
Last Post: study tips
  BOMB DETECTION ROBOT seminar flower 5 4,907 19-07-2013, 07:18 PM
Last Post: Guest
  Paper presentation on POWER THEFT DETECTION study tips 0 387 04-05-2013, 04:23 PM
Last Post: study tips
  Embedded system for Hazardous Gas detection and Alerting pdf study tips 0 348 02-05-2013, 12:37 PM
Last Post: study tips