Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Laimayum Bulbul Sharma; J. Dharani;
Page : 2473-2475
Keywords : Intrusion Detection System; barnyard2; Snortsam; Firewall Logs; mysql database; Snort Rule; Digital forensics;
Abstract
With the emerging of highly advance technology, risks in systems are also increases which even cannot be prevented by many security measures. Attacks in different form are being used to exploit the system through network. Intrusion Detection System (IDS) is used to detect the intrusion from such attack. IDS have certain limitation to detect and response in timely manner as well as to prevent the intrusion. On the other hand, IDS does not have the capability to capture the state of the system when an intrusion is detected Therefore it fails to preserve the evidences against the attack in original form and hence, digital evidence which is necessary in judicial proceedings for legal purpose cannot be produced in the court. The existing system used automatic digital forensic tool to capture the state of system when the intrusion occurs. But the damage control is yet to be considered. If the Alert log generated by IDS is altered tracking of intrusion will be fail. Our Primary aim is to focus on mitigation of damages done by an intrusion using firewall. We also used database to store the output log on another system to secure it.
Other Latest Articles
- A Study on Rural Education in Darjeeling
- Review on Hardware-in-Loop Simulation used to Advance Design Efficiency and Test Competency
- Comparative Analysis of Cascaded Half Bridge Inverter Using Different Modulation Techniques
- Case Report on Consanguineous Marriage
- A Review on Work Related Musculoskeletal Disorders of the Workers Working in Different Workstations
Last modified: 2021-06-30 21:34:49