Intrution Detection System
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Computer Science Clay
Active In SP

Posts: 712
Joined: Jan 2009
25-02-2009, 02:47 PM

Intrution Detection System

It is very important that the security mechanisms of a system are designed so as to prevent unauthorized access to system resources and data. However, completely preventing breaches of security appear, at present, unrealistic. We can, however, try to detect these intrusion attempts so that action may be taken to repair the damage later. This field of research is called Intrusion Detection. Anderson, while introducing the concept of intrusion detection in 1980, defined an intrusion attempt or a threat to be the potential possibility of a deliberate unauthorized attempt to:-

a.access information,
b.manipulate information, or
c.render a system unreliable or unusable.

Since then, several techniques for detecting intrusions have been studied. This paper discusses why intrusion detection systems are needed, the main techniques, present research in the field, and possible future directions of research. There are two ways to handle subversion attempts. One way is to prevent subversion itself by building a completely secure system. We could, for example, require all users to identify and authenticate themselves; we could protect data by various cryptographic methods and very tight access control mechanisms. However this is not really feasible because:-

1. In practice, it is not possible to build a completely secure system because bug free software is still a dream, & no-one seems to want to make the effort to try to develop such software.Apart from the fact that we do not seem to be getting our money's worth when we buy software, there are also security implications when our E-mail software, for example, can be attacked. Designing and implementing a totally secure system is thus an extremely difficult task.

2. The vast installed base of systems worldwide guarantees that any transition to a secure system, (if it is ever developed) will be long in coming.

3. Cryptographic methods have their own problems. Passwords can be cracked, users can lose their passwords, and entire crypto-systems can be broken.

4. Even a truly secure system is vulnerable to abuse by insiders who abuse their privileges.
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: downlaod intrusion detectios system pdf seminarsonly,
Popular Searches: subversion client, network intrution detection system e r diagram, free download ppt for intrution detection in homogeneous sensor network, how to wor k application of intrution detect system ppt, main project report for intrution detection system**f5 steganography matlab source code, subversion authz, subversion externals,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,348 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,219 16-07-2015, 09:21 PM
Last Post: Guest
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 263 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati
  credit card fraud detection ppt jaseelati 0 177 27-12-2014, 01:11 PM
Last Post: jaseelati
Lightbulb Fraud detection system for card transactions ffffff123456 0 376 26-04-2014, 05:19 AM
Last Post: ffffff123456
  Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN pdf study tips 1 924 09-02-2014, 05:40 PM
Last Post: Guest
  Design of an Error Detection and Data Recovery Architecture for Motion Estimation seminar projects maker 0 758 30-09-2013, 04:40 PM
Last Post: seminar projects maker
  Intrusion detection systems ( Download Full Seminar Report ) computer science crazy 8 15,167 28-09-2013, 03:01 PM
Last Post: Guest