Intrusion Detection System

Topics: Transmission Control Protocol, Host-based intrusion detection system, Computer network Pages: 37 (10579 words) Published: March 11, 2013
Report submitted in partial fulfillment of the requirement for the degree of  
  Bachelor of Technology
Computer Science and Engineering

Under the Supervision of
Mr. Pramod Parashar
Vishal Garg

 University School of Information Technology
Guru Gobind Singh Indraprastha University
Sector 16-C, Dwarka, Delhi
JULY 2012

This is to declare that this Report entitled “Intrusion Detection System “which is submitted by me in partial fulfillment of the requirement for the award of degree B.Tech. In Computer Science and Engineering to USIT, GGSIP University, Delhi comprises only my original work and due acknowledgement has been made in the text to all other material used. I further declare that this work has not been submitted to any other Institute/University for the award of any degree.

Date: 27/07/2012
Vishal Garg
B.Tech (CSE)

This is to certify that Report entitled “Intrusion Detection System” which is submitted by Vishal Garg in partial fulfillment of the requirement for the award of degree B.Tech. In Computer Science and Engineering to USIT, GGSIP University, Delhi is a record of the candidate own work carried out by him under my supervision. The matter embodied in this Report is original and has not been submitted for the award of any other degree. Date: 21/07/2012 Supervisor Mr. Pramod Parashar

I take this opportunity to express my sincere thanks and deep gratitude to all those people who extended their wholehearted co-operation and have helped me in completing this project successfully.

First of all, I would like to thank Mr. Vipin Tyagi (Director, C-DOT) for creating opportunities to undertake me in this esteemed organization.

Special thanks to Mr. Rajendra Prasad (Senior Officer, Training Dept. C-DOT ) for allowing me to do my summer internship in Rancore Technologies Pvt. Ltd, Gurgaon.

I am extremely thankful to Mr. Pramod Parashar (Project Manager, C-DOT) for providing me the opportunity to work on this project, his excellent guidance, his encouragement and support throughout the duration of the project.

I am very thankful to Mr. Navin Rajpal (Dean, USIT) for coordinating my Summer Internship after 6th Semester.

At last, I would like to thank all my fellow trainees in the Group for their support and providing me a wonderful working atmosphere.

B.Tech (CSE)

1.1 History of C-DOT8
1.2 Products9
1.3 Software9
1.4 Campus at Delhi10
2.1 Intrusion Detection12
2.2 Intrusion Detection System13
2.2.1 Need for Intrusion Detection System14
2.3 Components of Intrusion Detection System15
2.4 Types of Intrusion Detection Systems15
2.4.1 How to detect:15
2.4.2 Where to detect:17
2.5 Countermeasures besides IDS19
2.5.1 Firewalls19
2.5.2 Authentication19
2.5.3 VPNs (Virtual Private Networks)19
2.5.4 Encryption20
2.5.5 Lures/Honeypots20
3.1 Reconnaissance21
3.1.1 Ping sweeps:21
3.1.2 UDP scans:22
3.1.3 OS identification:22
3.1.4 Account scans:22
3.2 Exploits23
3.2.1 CGI scripts23
3.2.2 Web server attacks23
3.2.3 Web browser attacks24
3.2.4 SMTP (SendMail) attacks25
3.2.5 IP spoofing25
3.2.6 DNS attacks26
3.3 Denial-of-Service (DoS) attacks26
3.3.1 Ping-of-Death26
3.3.2 SYN Flood27
3.3.3 Land/Latierra27
3.3.4 WinNuke27
3.4 Worms, Viruses, and Trojan Horses27
3.4.1 Worms27...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Auction System Essay
  • A Cooperate Intrusion Detection System Framework for Cloud Computing Networks Essay
  • Intrusion Detection Systems Research Paper
  • Concurrent Collection as an Operating System Service for Cross-Runtime Cross-Language Memory Management Essay
  • Artificial Neural Networks for Misuse Detection Essay
  • Essay on Xray (an Intrusion Detection System)
  • Comparative Study of Intrusion Detection System for Mobile Ad-Hoc Networks Essay
  • Intrusion Detection Systems Essay

Become a StudyMode Member

Sign Up - It's Free