Intrusion Detection and Prevention Systems

Only available on StudyMode
  • Download(s) : 372
  • Published : April 25, 2011
Open Document
Text Preview
A Formal proposal for a dissertation that will be submitted in partial

Intrusion Detection and Prevention Systems

Topic Area: Intrusion Detection, Intrusion Prevention Systems

Keywords associated with this project: computer network, network security, malicious, vulnerabilities, attack, threats, quality of services, security policies.

MSc Course studied that contribute towards this dissertation: Network Technologies, Network security, Network Security management system.

Introduction:

An intrusion detection system (IDS) is a device or software application that monitors network system activities for malicious activities or policy violations and produces reports to a Management Station.

Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents.

Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators.

Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators.

There are four type of intrusion detection and prevention system.

• Network based IDP

• Wireless IDP

• Network activities anomaly detection

• Host based IDP implementing misuse detection or anomaly detection methodology.

The goal of this research is to analyze intrusion detection techniques and evaluate feasible tool for detect unauthorized access.

Objectives:

It is very important for computer professionals to enlarge the knowledge of network and internet security to provide reliable and substantiate service to customers because of increasing rate of hackers and talented computers professionals who want to exploits the security bugs and get benefited by unauthorized access. Firewalls and antivirus are not sufficient enough to stop those super human brains whose mind programs enough faster than antivirus programs and they easily get access into the system by undetectable Trojans and destructive software. To prevent intruders these days we need to provide extra security as Intrusion detection and prevention system.

The current trend is that it is becoming increasingly easier to attack computer systems. More people with limited computer knowledge can carry out attack on poorly maintained systems, because attack tools are increasingly accessible and usable. A manifestation of this is the movement of attack tools from command-line to graphical-based tools.

Security breaches can have damaging consequences particularly for e-business, which is simply Internet-aided business. Enterprises, for example, depend on information to run their businesses, which is constantly increasing. Hence, there is need to ensure its security, confidentiality, integrity, and availability, to maintain a competitive edge over other businesses. Many assume that by securing entry into the network, they can secure their systems. It is not sufficient to focus only on security within networks. Other aspects of the whole system also have to be taken into consideration; for instance, operating system and application security, such as, software and database security.

This research objective is to analyze and evaluate knowledge based techniques how to detect and prevent hackers or unauthorized intruders to access information.

How the objectives will be achieved:

Different IDS adopt different detection techniques: Data mining and computational intelligence, Artificial Neural Networks, Resilient Back Programs, Support Vector Machines, Multivariate adaptive regression splines and Computational intelligent agents based architecture. Quasi experiment...
tracking img