Intrusion Detection System
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
30-01-2010, 07:58 AM


Description : Many solutions have been arrived at in the past to counter the problem of intruders in a network among which Firewalls were predominantly ruling. However with rapid growth of the Internet, hackers and attackers are provided with the ability to inflict major damage to organizationâ„¢s vital data. Attackers are forever in the process of developing new tools to exploit applications necessary for an organization to maintain an Internet presence. As methods to overcome or exploit the firewall are employed by them, it becomes mandatory that more advanced and layered security technologies be employed to protect against hacker attacks. A technology that has gained momentum attention from industry analysts and trade media is Decoy-based intrusion protection, otherwise known as "Honey pot" technology. This technology is used to contain and control an attack and resembles deception techniques employed in warfare that divert enemies into attacking false troops or airfields. Systems here can defend against attacks on network assets from attackers raging a war on the enterprise for information. Honey pots were used by researchers and generally placed outside the firewall to discover hackers on a network system. Using Honeypots, researchers could study the tactics, tools, movements, and behavior of intruders. Today honeypots play an important part in enterprise security. This paper defines honeypots, describes their advantages, and outlines how they act as complementary components of an overall intrusion protection strategy.
Technologies : java ,Swing
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
fruit
Active In SP
**

Posts: 18
Joined: May 2011
#2
20-05-2011, 10:33 AM

plz send a full report to my email- fruit_ooi10@yahoo.com . thanks~
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,808 02-06-2014, 09:51 AM
Last Post: seminar project topic
  ON THE EFFECTIVENESS OF MONITORING FOR INTRUSION DETECTION IN MOBILE AD HOC abstract seminar tips 2 800 09-05-2014, 09:43 AM
Last Post: seminar project topic
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 9 11,431 28-10-2013, 10:50 PM
Last Post: Guest
  Efficient and Robust Detection of Duplicate Videos in a Large Database Report seminar projects maker 0 435 24-09-2013, 12:47 PM
Last Post: seminar projects maker
  Online and Offline Intrusion Alert Aggregation pdf seminar projects maker 0 296 14-09-2013, 12:55 PM
Last Post: seminar projects maker
  IMAGE SEGMENTATION BY USING EDGE DETECTION pdf seminar projects maker 0 436 12-09-2013, 02:16 PM
Last Post: seminar projects maker
  SELECTION OF FEATURE REGION SET USING HARRIS- LAPLACIAN DETECTION FOR WATERMARKING study tips 0 360 02-09-2013, 04:56 PM
Last Post: study tips
  Report on Intrusion Detection System Using Advanced Honeypots study tips 0 336 30-08-2013, 01:27 PM
Last Post: study tips
  SUSPICIOUS EMAIL DETECTION seminar class 9 6,407 31-07-2013, 07:18 PM
Last Post: Guest
  Artificial Intelligence in Trojan detection Report study tips 0 413 04-07-2013, 04:48 PM
Last Post: study tips