Preview

Xray (an Intrusion Detection System)

Good Essays
Open Document
Open Document
6146 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Xray (an Intrusion Detection System)
Synopsis of XRAY
(An Intrusion Detection System)

Bachelor of Technology
In
Information Technology

Under the guidance of
Mr. Pinaki Chatopadhya
Lecturer
Department of Computer Science and Engg.

Submitted by Balgovind 0609113028 Gaurav Kapoor 0609113039 Javed Ansari 0609113046 Mayank Mehrotra 0609113061

Department of Information Technology
JSS Academy Of Technical Education
Noida
(2009-2010)

TABLE OF CONTENTS

Title Page……………………………… Page i Table of contents………………………. Page ii
Motivation……………………………… 3
Project Objective………………………. 4
Scope of the project……………………. 5
Fig 1: Pert Chart………………………… 6
Fig 2: Gantt Chart………………………. 7
Technical Feasibility……………………. 8
References………………………………. 10
APPENDIX I……………………………. 11
AAPENDIX II…………………………... 12

MOTIVATION

Intrusion detection is defined to be the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are exceeding their privileges (i.e., the insider threat). Work is being done elsewhere on Intrusion Detection Systems (IDS’s) for a single host and for several hosts connected by a network . The proliferation of heterogeneous computer networks has serious implications for the intrusion detection problem. Foremost among these implications is the increased opportunity for unauthorized access that is provided by the network’s connectivity. This problem is exacerbated when dial-up or internetwork access is allowed, as well as when unmonitored hosts (viz. hosts without audit trails) are present. The use of distributed rather than centralized computing resources also implies reduced control over those resources. Moreover, multiple independent computers are likely to generate more audit data than a single computer, and this audit data is dispersed among the various systems.
Clearly, not all of the audit data can be forwarded to



References: 7. Teresa F Lunt. Detecting Intruders in Computer Systems. Conference on Auditing and Computer Technology, 1993. 8

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    An IDS is a software or hardware tool which allows to detect and warn about an attack or…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Os Security

    • 369 Words
    • 2 Pages

    Host Intrusion Detection System: A Host Intrusion Detection system is similar to Antivirus in that it looks for suspicious activity and compares against a definition file, but it also inspects network traffic that comes through the local interface. This allows the HIDS to detect an attack before it has actually put anything on your computer. HIDS also creates a host baseline, to which changes are reported to an administrator. This can result in a lot of logs if changes are made on a regular basis. This solution is both difficult to configure and maintain.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    Sommer, R. (2009, July). An architecture for exploiting multi-core processors to parallelize network intrusion prevention..Concurrency & Computation: Practice & Experience, 21(10)…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Gathering information about a remote system is often considered the first step an "intelligent hacker” takes in launching an attack against or gain privileged access to a target machine. Intelligence gathered in this research can provide useful information about vulnerabilities or misconfigurations that can be successfully exploited by the potential intruder. The more a hacker knows about a particular system (e.g. the operating system (OS), the hardware architecture and services that are running), the greater are his or her chances of launching a successful attack. By knowing the operating system and system type, a hacker can do a little research and come up with a list of known vulnerabilities.…

    • 9158 Words
    • 37 Pages
    Powerful Essays
  • Good Essays

    Honeypots

    • 7197 Words
    • 29 Pages

    The Internet is growing fast and doubling its number of websites every 53 days and the number of people using the internet is also growing. Hence, global communication is getting more important every day. At the same time, computer crimes are also increasing. Countermeasures are developed to detect or prevent attacks - most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism; but is there enough information about the enemy?…

    • 7197 Words
    • 29 Pages
    Good Essays
  • Good Essays

    The SANS Institute (2012). Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment: http://www.sans.org/reading-room/whitepapers/detection/logging-monitoring-detect-network-intrusions-compliance-violations-environment-33985…

    • 577 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Virtualization

    • 3094 Words
    • 9 Pages

    Shou, T. S. (2011). Development of an intrusion detection and prevention course project using virtualization technology. International Journal of Education and Development using Information and Communication Technology, 7(2), 46-55.…

    • 3094 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Intrusion Detection

    • 403 Words
    • 2 Pages

    Contrary to that belief, however, is the obvious concept that, when an event occurs, there is a high probability that the IDS will be the only thing watching the network in significant enough detail to capture the event and any precursor events in their entirety. Thus, the application of the output of an IDS to the investigation and potential prosecution of an attack against computers on a network is of interest both to practitioners and to researchers.…

    • 403 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Cafe Management

    • 1462 Words
    • 6 Pages

    The system we propose has great scope in the current real time situation. The cyber crime monitoring system can be enhanced to an extent by implementing this system. Most of the firms and establishments are being computerized in order to ease the tasks to be performed. The internet cafés unfortunately are rarely computerized. We aim through this venture, a better reliable solution.…

    • 1462 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    system security

    • 573 Words
    • 2 Pages

    • Masquerader: An individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account…

    • 573 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    management

    • 460 Words
    • 5 Pages

    programming and Oracle Developer 2000 for the GUI and the front end. It provided a…

    • 460 Words
    • 5 Pages
    Satisfactory Essays