Xray (an Intrusion Detection System)

Only available on StudyMode
  • Topic: Intrusion detection system, Computer, Host-based intrusion detection system
  • Pages : 18 (6146 words )
  • Download(s) : 24
  • Published : January 28, 2013
Open Document
Text Preview
Synopsis
of
XRAY
(An Intrusion Detection System)

Bachelor of Technology
In
Information Technology

Under the guidance of
Mr. Pinaki Chatopadhya
Lecturer
Department of Computer Science and Engg.

Submitted by
Balgovind 0609113028
Gaurav Kapoor 0609113039
Javed Ansari 0609113046
Mayank Mehrotra 0609113061

Department of Information Technology
JSS Academy Of Technical Education
Noida
(2009-2010)

TABLE OF CONTENTS

Title Page……………………………… Page i Table of contents……………………….Page ii
Motivation………………………………3
Project Objective……………………….4
Scope of the project…………………….5
Fig 1: Pert Chart…………………………6
Fig 2: Gantt Chart……………………….7
Technical Feasibility…………………….8
References……………………………….10
APPENDIX I…………………………….11
AAPENDIX II…………………………...12

MOTIVATION

Intrusion detection is defined to be the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are exceeding their privileges (i.e., the insider threat). Work is being done elsewhere on Intrusion Detection Systems (IDS’s) for a single host and for several hosts connected by a network . The proliferation of heterogeneous computer networks has serious implications for the intrusion detection problem. Foremost among these implications is the increased opportunity for unauthorized access that is provided by the network’s connectivity. This problem is exacerbated when dial-up or internetwork access is allowed, as well as when unmonitored hosts (viz. hosts without audit trails) are present. The use of distributed rather than centralized computing resources also implies reduced control over those resources. Moreover, multiple independent computers are likely to generate more audit data than a single computer, and this audit data is dispersed among the various systems. Clearly, not all of the audit data can be forwarded to a single IDS for analysis; some analysis must be accomplished locally. A narrow definition of computer security is based on the relation of confidentiality, integrity and availability in computer system. Confidentiality requires that information be accessible only to those authorized for it, integrity requires that information remain unaltered by accidents or malicious attempts, and availability means that the computer system remains working without degradation of access and provides resources to authorized users when they need it. By this definition, an unreliable computer system is unsecure if availability is part of its security requirements.

PROJECT OBJECTIVE

Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external penetrators. The proliferation of heterogeneous computer networks provides additional implications for the intrusion detection problem. Namely, the increased connectivity of computer systems gives greater access to outsiders, and makes it easier for intruders to avoid detection. IDS’s are based on the belief that an intruder’s behaviour will be noticeably different from that of a legitimate user. We are designing and implementing a prototype Distributed Intrusion Detection System (DIDS) that combines distributed monitoring and data reduction (through individual host and LAN monitors) with centralized data analysis (through the DIDS director) to monitor a heterogeneous network of computers. This approach is unique among current IDS’s. A main problem considered in this paper is the Network- user Identification problem, which is concerned with tracking a user moving across the network, possibly with a new user-id on each computer. Initial system prototypes have provided quite favourable results on this problem and the detection of attacks on a network. This paper provides an overview of the motivation behind DIDS, the system architecture and...
tracking img