Attack Scenarios Construction and Automated Report Generation in SACHET Intrusion
#1

[attachment=15192]
Attack Scenarios Construction and Automated Report Generation in SACHET Intrusion Detection System
An Intrusion Detection Systems (IDS) is a passive system which relies on the system administrator to take action when an attack is detected. The latency between an attack detection and corrective action taken by the administrator is usually high and therefore, by the time the administrator notices an attack and takes an action, the damage is already done. This necessitates the need for an Intrusion Prevention System which can not only detect attacks but can also actively respond to them. Intrusion prevention is a pre-emptive approach to system security which is used to identify potential threats and respond to them swiftly.
Vulnerability Assessment would provide a clear picture of all hosts on the network, the services that they provide and also information on the known vulnerabilities. This information would help the administrator in configuring the IDS and can also be used to assign priority to an alert.
In this thesis, we describe the design and implementation of Intrusion Prevention and Vulnerabilty Assessment schemes for Sachet IDS. Sachet is a distributed, real time network-based Intrusion Detection System with centralized control developed at IIT Kanpur. Sachet uses an open source software, Snort, for signature-based detection. Recently, a new version of Snort, snort-inline, has been released for Linux which has intrusion prevention capability. The aim of Intrusion Prevention for Sachet is to provide this capability for Windows operating system. The aim of Vulnerability Assessment is to determine the vulnerabilities of machines monitored by Sachet at regular intervals and to use this information to assign priority to alerts generated by Snort.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: empty sachet detection, test scenarios for actitime application, 2015 scenarios for, wireless intrusion detection and new attack model, a wireless intrusion detection system and a new attack model java, report of ip spofing attack pdf, design and implementation of an anomaly detection scheme in sachet intrusion,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN AND CONSTRUCTION OF A TWO – WAY WIRED INTERCOM seminar class 8 19,451 08-07-2018, 06:37 PM
Last Post: Guest
  Voice Based Automated Transport Enquiry System seminar class 2 3,187 05-10-2016, 09:34 AM
Last Post: ijasti
  DESIGN AND IMPLEMENTATION OF GOLAY ENCODER AND DECODER computer science crazy 2 23,630 26-08-2016, 03:46 PM
Last Post: anasek
  WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS seminar class 7 19,073 17-08-2016, 09:23 AM
Last Post: jaseela123d
  IMAGE CAPTURE AUTOMATED TOLL GATE smart paper boy 3 2,987 11-07-2015, 01:43 PM
Last Post: Guest
  Micro controller based automated irrigation system Electrical Fan 28 20,998 29-01-2015, 05:32 PM
Last Post: Guest
  AUTOMATED TRAFFIC SIGNAL CONTROLLER full report project topics 7 10,292 02-09-2013, 10:40 PM
Last Post: Guest
  ANTI THEFT ALERT AND AUTO ARRESTING SYSTEM FOR MUSEUMS AND JEWELRY SHOPS project report helper 11 14,614 12-08-2013, 09:57 AM
Last Post: computer topic
  Automatic Railway Gate Control and Track Switching full report project topics 14 25,063 23-04-2013, 05:54 PM
Last Post: Ramachandra c
  AUTOMATED TOLL COLLECTION AND ALCHCOL DETECTION USING PSOC full report project topics 6 7,357 08-04-2013, 03:28 PM
Last Post: computer topic

Forum Jump: