INTRUSION DETECTION SYSTEM
Report submitted in partial fulfillment of the requirement for the degree of
Bachelor of Technology
Computer Science and Engineering
Under the Supervision of
Mr. Pramod Parashar
University School of Information Technology
Guru Gobind Singh Indraprastha University
Sector 16-C, Dwarka, Delhi
This is to declare that this Report entitled “Intrusion Detection System “which is submitted by me in partial fulfillment of the requirement for the award of degree B.Tech. In Computer Science and Engineering to USIT, GGSIP University, Delhi comprises only my original work and due acknowledgement has been made in the text to all other material used. I further declare that this work has not been submitted to any other Institute/University for the award of any degree.
This is to certify that Report entitled “Intrusion Detection System” which is submitted by Vishal Garg in partial fulfillment of the requirement for the award of degree B.Tech. In Computer Science and Engineering to USIT, GGSIP University, Delhi is a record of the candidate own work carried out by him under my supervision. The matter embodied in this Report is original and has not been submitted for the award of any other degree. Date: 21/07/2012 Supervisor Mr. Pramod Parashar
I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully.
First of all, I would like to thank Mr. Vipin Tyagi (Director, C-DOT) for creating opportunities to undertake me in this esteemed organization.
Special thanks to Mr. Rajendra Prasad (Senior Officer, Training Dept. C-DOT ) for allowing me to do my summer internship in Rancore Technologies Pvt. Ltd, Gurgaon.
I am extremely thankful to Mr. Pramod Parashar (Project Manager, C-DOT) for providing me the opportunity to work on this project, his excellent guidance, his encouragement and support throughout the duration of the project.
I am very thankful to Mr. Navin Rajpal (Dean, USIT) for coordinating my Summer Internship after 6th Semester.
At last, I would like to thank all my fellow trainees in the Group for their support and providing me a wonderful working atmosphere.
TABLE OF CONTENTS
1.1 History of C-DOT
1.4 Campus at Delhi
INTRODUCTION TO INTRUSION DETECTION
2.1 Intrusion Detection
2.2 Intrusion Detection System
2.2.1 Need for Intrusion Detection System
2.3 Components of Intrusion Detection System
2.4 Types of Intrusion Detection Systems
2.4.1 How to detect:
2.4.2 Where to detect:
2.5 Countermeasures besides IDS
2.5.3 VPNs (Virtual Private Networks)
TYPES OF ATTACKS
3.1.1 Ping sweeps:
3.1.2 UDP scans:
3.1.3 OS identification:
3.1.4 Account scans:
3.2.1 CGI scripts
3.2.2 Web server attacks
3.2.3 Web browser attacks
3.2.4 SMTP (SendMail) attacks
3.2.5 IP spoofing
3.2.6 DNS attacks
3.3 Denial-of-Service (DoS) attacks
3.3.2 SYN Flood
3.4 Worms, Viruses, and Trojan Horses
Please join StudyMode to read the full document