Host Based Intrusion Detection System
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 4)Publication Date: 2015-04-05
Authors : Vishal Parande; Sharada Kori;
Page : 559-561
Keywords : Intrusion detection system; logs; cryptography; digital forensic;
Abstract
In todays technology, new attacks are emerging day by day which makes the systems insecure even the system wrapped with number of security measures. Intrusion Detection System (IDS) is used to detect the intrusion. Intrusion Detection System (IDS) is crucial requirement to safeguard the organization electronic assets. Intrusion detection is a process analyze the traffic on a device or network to determine whether the traffic is malicious or not. In other words, intrusion is any unauthorized attempt to access private data of which the intruder doesnt have access rights. It can be a software or physical entity that monitors the traffic which violates organization security policies and standard security practices. An Intrusion Detection System is made to mainly avoid the intruder from being successful in accessing the prohibited files. It continuously analyzes the traffic to detect the intrusion and respond in timely manner as a result of which risks of intrusions are diminished. It not only stops the intruder from getting access but also captures an image of the changes that he makes in the files. An added feature of capturing a webcam image of the intruder at the time of intrusion can also be collected.
Other Latest Articles
- Pitch Control of Horizontal Axis Wind Turbine
- Automatic Sliding Window
- A Study to Assess the Effectiveness of Helfer Skin Tap Technique on Pain During Intramuscular Injection Among Neonates Born in Labour Room of a Selected Tertiary Level Hospital, UP
- Improving Quality of Apple Using Computer Vision&Image Processing Based Grading System
- Development of Modified Questionnaire for Screening Purposes for Obstructive Sleep Apnea in Pediatric Population
Last modified: 2021-06-30 21:44:39