Attack Scenarios Construction and Automated Report Generation in SACHET Intrusion
#1

Attack Scenarios Construction and Automated Report Generation in SACHET Intrusion Detection System

Increased connectivity and the use of the Internet have exposed the organizations to subversion, thereby necessitating the use of intrusion detection systems to protect information systems and communication networks from malicious attacks and unauthorized access. An Intrusion Detection System (IDS) is a security system that monitors computer systems and network traffic, analyzes that traffic to identify possible security breaches, and raises alerts. An IDS triggers thousands of alerts per day making it difficult for human users to analyze them and take appropriate actions. It is therefore important to reduce the redundancy of alerts, intelligently integrate and correlate them, and to present high level view of the detected security issues to the administrator.

In this thesis, we describe the design and implementation of attack scenarioconstruction and automated report generation modules for Sachet - a distributed, real-time, network-based IDS developed at lIT Kanpur. The aim of attack scenario construction is to identify logical relations among low level alerts, correlate them, and to provide the system administrator with a condensed view of reported security issues known as attack scenarios. The alerts are correlated on the assumption that most intrusions are not isolated but related as different stages of a series of attacks, with the early stages preparing for the latter ones. The module was successfully tested on a benchmark 2000 DARPA data set. Automated report generation takes the alerts produced by Sachet and generates reports which provide the system administrator with an overall picture of the status of the network under surveillance.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: empty sachet detection, scenarios, seminar report on salami attack, design and implementation of an anomaly detection scheme in sachet intrusion, a wireless intrusion detection system and a new attack model java, wireless intrusion detection and new attack model, automated lead generation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  The Impact of the Automated Teller Machine smart paper boy 2 2,372 08-01-2018, 09:52 AM
Last Post: RaymondGom
  Service-Oriented Architecture for Weaponry and Battle Command and Control Systems in 1 1,045 15-02-2017, 03:40 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 704 14-02-2017, 11:26 AM
Last Post: ijasti
  GENERATION OF PAYSLIP project report helper 2 4,360 04-01-2016, 02:49 PM
Last Post: seminar report asees
  Visa Processing System full report and asp source code project topics 2 5,496 19-06-2014, 06:54 PM
Last Post: seminar report asees
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 3,181 26-04-2013, 01:58 PM
Last Post: Guest
  application projects in java and vb.net (titles and topics) project topics 1 5,463 28-11-2012, 01:11 PM
Last Post: seminar details
  DEFENDING SYN ATTACK IN TCP USING CRYPTOGRAPHY nit_cal 1 1,898 30-10-2012, 04:56 PM
Last Post: Guest
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,161 24-10-2012, 01:09 PM
Last Post: seminar details
  Design and Implementation of an Open Autonomous Mobile Robot System full report seminar topics 1 2,435 19-10-2012, 01:58 PM
Last Post: seminar details

Forum Jump: