Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP

Posts: 604
Joined: Dec 2008
31-01-2009, 12:41 AM

Intrusion detection is a set of techniques and methods that are used to detect suspicious activity both at the network and host level. Intrusion detection systems fall into two basic categories: signature-based intrusion detection systems and anomaly detection systems. Intruders have signatures, like computer viruses, that can be detected using software. You try to find data packets that contain any known intrusion-related signatures or anomalies related to Internet protocols. Based upon a set of signatures and rules, the detection system is able to find and log suspicious activity and generate alerts. Anomaly-based intrusion detection usually depends on packet anomalies present in protocol header parts. In some cases these methods produce better results compared to signature-based IDS. Usually an intrusion detection system captures data from the network and applies its rules to that data or detects anomalies in it. Snort is primarily a rule-based IDS, however input plug-ins are present to detect anomalies in protocol headers.

Snort uses rules stored in text files that can be modified by a text editor. Rules are grouped in categories. Rules belonging to each category are stored in separate files. These files are then included in a main configuration file called snort.conf. Snort reads these rules at the start-up time and builds internal data structures or chains to apply these rules to captured data. Finding signatures and using them in rules is a tricky job, since the more rules you use, the more processing power is required to process captured data in real time. It is important to implement as many signatures as you can use few rules as possible. Snort comes with a rich set of pre-defined rules to detect intrusion activity and you are free to add your own rules at will. You can also remove some of the built-in rules to avoid false alarms.

Here I describe intrusion detection, related terminology, installation and management of Snort as well as other products that work with Snort. These products include the database and Analysis Control for Intrusion Database (ACID). Snort has the capability to log data collected (such as alerts and other log messages) to a database. MySQL is used as the database engine where all of this data is stored. Using Apache web server and ACID, you can analyze this data. A combination of Snort, Apache, Myself, and ACID makes it possible to log the intrusion detection data into a database and then view and analyze it later, using a web interface.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: snort project report, anomaly base intrusion detection, instrution detection eletronic seminaar topic, roject on snort an intrusion detection system, anomaly detection snort, seminar topic related to intrusion detection system, project report on ids uding snort,
Popular Searches: project on snort an intrusion detection system, intrusion wsitch, anomaly detection with snort, seminar topic related to intrusion detection system, how to snort features connect with matlab, intruder detection system on abnormal internet sequence snort detailed report, intrusion detection policy,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF LOST MOBILE USING SNIFFERS seminar class 64 33,775 12-04-2016, 03:24 PM
Last Post: mkaasees
  power theft detection via plc pdf jaseelati 0 323 22-01-2015, 03:31 PM
Last Post: jaseelati
  network intrusion detection system project report doc jaseelati 0 359 13-01-2015, 01:15 PM
Last Post: jaseelati
  deadlock detection algorithm source code c jaseelati 0 261 10-01-2015, 02:18 PM
Last Post: jaseelati
  bomb detection robotics using embedded controller jaseelati 0 313 06-01-2015, 04:50 PM
Last Post: jaseelati
  network intrusion detection system project report jaseelati 0 235 23-12-2014, 03:08 PM
Last Post: jaseelati
Last Post: study tips
  BOMB DETECTION ROBOT seminar flower 5 4,896 19-07-2013, 07:18 PM
Last Post: Guest
  Paper presentation on POWER THEFT DETECTION study tips 0 384 04-05-2013, 04:23 PM
Last Post: study tips
  Embedded system for Hazardous Gas detection and Alerting pdf study tips 0 344 02-05-2013, 12:37 PM
Last Post: study tips