Dublin Core
Title
OPEN SOURCE INTRUSION DETECTION SYSTEM USING SNORT
Abstract
Keywords: Snort, IDS, Intrusion Detection System, Intrusion. ABSTRACT Software and hardware components are parts of almost every Intrusion Detection System (IDS) which is able to monitor computer networks for any possible security incidents. Using Internet resources all over the world has been becoming as one of the most popular task among all people and this usage and connection to Internet creates security risk for many different network attacks. Since these attacks and threats can strongly affects network security. IDS has become one of the most useful network security system which helps users to protect their valuable resource and their, integrity and availability of information located in the protected part of any organization’s computer network. Therefore, IDS system has a very significant role protect users, companies or any institutions to detect cases. IDS can be designed as signature-based or anomaly-based detection system. Signature-based system is only eligible to detects attacks which are already known and anomaly-based systems are eligible to detect unknown attacks which give them functionality to be proactive i.e. to resolve attack before it harm specific protected system.
Keywords
Article
PeerReviewed
PeerReviewed
Identifier
ISSN 2233-1565
Publisher
International Burch University
Date
2013-05-24
Extent
2149
Document Viewer
Click below to view a document.