Intrusion detection system IDS seminars report
#6

SUBMITTED BY:
SUMANTA KUMAR DAS

[attachment=6368]


Abstract

An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization.


Introduction

An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs have become a necessary addition to the security infrastructure of nearly every organization.


IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDPSs can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack’s content.

Hence we need IDS in our regular use of network. as it may protect us from malicious activities which are invisible to us but they are lightly or severely harmful for us . so IDS is important for home user, server, workstations, govt security portal etc.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report on intrusion detection, intrusion detection system u, subversion branching, intrusion detection and prevention seminar report, subversion authz, embedded auditors for intrusion detection for seminar, project report on ids,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Intrusion detection system IDS seminars report - by seminar surveyer - 18-10-2010, 10:04 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,686 24-11-2018, 01:19 AM
Last Post:
  OBJECT TRACKING AND DETECTION full report project topics 9 31,212 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Host-Based Intrusion Detection Using user signatures nit_cal 2 2,401 06-10-2016, 10:27 AM
Last Post: ijasti
  DETECTION OF THE MALARIAL PARASITE INFECTED BLOOD IMAGES BY 3D-ANALYSIS project report tiger 2 2,387 26-09-2016, 10:55 AM
Last Post: ijasti
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,117 15-04-2016, 08:04 PM
Last Post: knagpur
  eyeOS cloud operating system full report seminar topics 8 11,255 20-03-2014, 11:26 PM
Last Post: seminar report asees
  Modular Computing seminars report computer science crazy 4 21,629 08-10-2013, 04:32 PM
Last Post: Guest
  eye gaze communication system full report seminar topics 19 35,459 26-07-2013, 01:45 PM
Last Post: computer topic
  ARTIFICIAL INTELLIGENCE IN VIRUS DETECTION AND RECOGNITION seminar project explorer 2 3,364 22-07-2013, 11:44 AM
Last Post: computer topic
  self managing computing system full report computer science technology 5 14,160 18-05-2013, 09:48 AM
Last Post: computer topic

Forum Jump: