ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Internal Intrusion Detection Systems

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)

Publication Date:

Authors : ; ;

Page : 1954-1955

Keywords : Intrusion Detection Systems; Digital Forensic; Logs; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Now a days computer systems use user IDs and passwords as the login patterns to validate users. However, most of the people share their login patterns with co-workers and request them to assist co-tasks. There are new attacks are appear everyday due to that the system makes the insecure even the system wrapped with number of security measures. To detect the intrusion, an Intrusion Detection System (IDS) is used. To detect the intrusion and respond in timely manner is its main function. In other words IDS function is limited to detection as well as response. The IDS is unable to capture the state of the system when an intrusion is disclosed. So that, in original form, it fails to preserve the evidences against the attack. New security system strategy is very much needed to maintain the completeness and reliability of proof for later examination. In this research work, there proposed an automated Digital Forensic Technique with Intrusion Detection System. It sends an alert notification message to capture the state of the system, to administrator followed by invoke the digital forensic tool Once an IDS catch an intrusion. To prove the damage Captured image can be used as evidence in the court of law.

Last modified: 2021-07-01 14:47:12