Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 3

Intrusion Detection System

Group Members:

Pramit Mishra Nikhil Sharma Prakhar S. Chauhan Mayank Atri

GUIDE: ______________________

Project InCharge:__________________

TITLE: Intrusion Detection System Abstract:


Intrusion detection systems (IDSs) are hardware or software systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems.An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).

Resources Used:
Language used Java Database MS Access Platform - Textpad Other specifications Microsoft XP OS, Java version 1.5.0

Scope:

Intrusion Detection can be defined as "the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource." More specifically, the goal of intrusion detection is to identify entities attempting to subvert in-place security controls. Intrusion -detection systems typically are passive systems that simply detect problems and perhaps alert someone. They do not block any traffic, or take active measures to stop an attack. A properly configured firewall can allow only certain types of traffic to pass, thus protecting the internal network from any number of malicious activities

You might also like