12-10-2010, 02:59 PM
[attachment=5720]
Intrusion detection system IDS seminar report.doc
Presented By:-
1) Amol Mane(1959)
2)Jyoteeram Mane(1960)
3)Sagar Pawar(1961)
4)Sharad Chormale(196
Under the Guidance of
Mr. S. V. Patil.
ABSTRACT
Internet Information Services (IIS) web servers “ which host web pages and serve them to users “ are highly popular among business organizations, with over 6 million such servers installed worldwide. Unfortunately, IIS web servers are also popular among hackers and malicious fame-seekers “ as a prime target for attacks. As a result, every so often, new exploits emerge which endanger your IIS web server™s integrity and stability. Many administrators have a hard time keeping up with the various security patches released for IIS to cope with each new exploit, making it easy for malicious users to find a vulnerable web server on the Internet. Immediate Intrusion Detection suggests that all of these vulnerabilities the same system files, careful monitoring of these files could provide you with an inexpensive form of real-time intrusion detection. The market is currently filled mostly by rule-based IDS solutions aiming at detecting already known attacks by analysing traffic flow and looking for known signatures. This fact requires such IDS to be under constant construction updating and modifying attack signatures and requiring to pay considerable financial amount for support. On the other hand it is possible to use anomaly based IDS solutions detecting not just known attacks but also unknown attacks and informing network engineers about possible network problems or helping them to troubleshoot them. The market is currently filled mostly by rule-based IDS solutions aiming at detecting already known attacks by analysing traffic flow and looking for known signatures. This fact requires such IDS to be under constant construction updating and modifying attack signatures and requiring to pay considerable financial amount for support. On the other hand it is possible to use anomaly based IDS solutions detecting not just known attacks but also unknown attacks and informing network engineers about possible network problems or helping them to troubleshoot them.
Reference: http://studentbank.in/report-intrusion-d...z128Q1ElWP