Internal Intrusion Detection Systems
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)Publication Date: 2016-11-05
Authors : Bhingardive Deepali R; Ranmalkar Vrushali S;
Page : 1954-1955
Keywords : Intrusion Detection Systems; Digital Forensic; Logs; Cryptography;
Abstract
Now a days computer systems use user IDs and passwords as the login patterns to validate users. However, most of the people share their login patterns with co-workers and request them to assist co-tasks. There are new attacks are appear everyday due to that the system makes the insecure even the system wrapped with number of security measures. To detect the intrusion, an Intrusion Detection System (IDS) is used. To detect the intrusion and respond in timely manner is its main function. In other words IDS function is limited to detection as well as response. The IDS is unable to capture the state of the system when an intrusion is disclosed. So that, in original form, it fails to preserve the evidences against the attack. New security system strategy is very much needed to maintain the completeness and reliability of proof for later examination. In this research work, there proposed an automated Digital Forensic Technique with Intrusion Detection System. It sends an alert notification message to capture the state of the system, to administrator followed by invoke the digital forensic tool Once an IDS catch an intrusion. To prove the damage Captured image can be used as evidence in the court of law.
Other Latest Articles
- Prevalence of Chlamydia Trachomatis in Women of Reproductive Age in Albania
- Survey of Noise in Image and Efficient Technique for Noise Reduction
- Knowledge and Attitudes of Saudi Consumers on Medication Use
- Effects of Aqueous Extract of Hibiscus sabdariffa L. (Malvaceae) on the Cardiac Contraction of Rat and Research of the Mechanism of Action
- Internet of Things and Competitive Advantage
Last modified: 2021-07-01 14:47:12