Downloads: 113 | Views: 344 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Information Technology | India | Volume 4 Issue 3, March 2015 | Popularity: 6.6 / 10
Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall
Laimayum Bulbul Sharma, J. Dharani
Abstract: With the emerging of highly advance technology, risks in systems are also increases which even cannot be prevented by many security measures. Attacks in different form are being used to exploit the system through network. Intrusion Detection System (IDS) is used to detect the intrusion from such attack. IDS have certain limitation to detect and response in timely manner as well as to prevent the intrusion. On the other hand, IDS does not have the capability to capture the state of the system when an intrusion is detected Therefore it fails to preserve the evidences against the attack in original form and hence, digital evidence which is necessary in judicial proceedings for legal purpose cannot be produced in the court. The existing system used automatic digital forensic tool to capture the state of system when the intrusion occurs. But the damage control is yet to be considered. If the Alert log generated by IDS is altered tracking of intrusion will be fail. Our Primary aim is to focus on mitigation of damages done by an intrusion using firewall. We also used database to store the output log on another system to secure it.
Keywords: Intrusion Detection System, barnyard2, Snortsam, Firewall Logs, mysql database, Snort Rule, Digital forensics
Edition: Volume 4 Issue 3, March 2015
Pages: 2473 - 2475
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2487 - 2494Cybersecurity Strategies for Legacy Telecom Systems: Developing Tailored Cybersecurity Strategies to Secure aging Telecom Infrastructures against Modern Cyber Threats, Leveraging your Experience with Legacy Systems and Cybersecurity Practices
Jeevan Manda
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 10 Issue 12, December 2021
Pages: 695 - 698Intrusion Detection using Machine Learning Techniques
Akshay Kaushik, Varun Goel
Downloads: 95
Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014
Pages: 1479 - 1482Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System
Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti
Downloads: 112
Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015
Pages: 1127 - 1130Analysis and Data Retrieval by Filtering Packets in High Speed Routers
Indumathi, K. Kumar
Downloads: 114
Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015
Pages: 1576 - 1580Intrusion Detection in Wireless Network Using Fuzzy Rules
Ketaki P. Bhusari, Swati G. Kale