+

Kurundkar et al., 2012 - Google Patents

Network intrusion detection using Snort

Kurundkar et al., 2012

View PDF
Document ID
3883680912989867101
Author
Kurundkar G
Naik N
Khamitkar S
Publication year
Publication venue
International Journal of Engineering Research and Applications

External Links

Snippet

An intruder is a hacker or cracker which always tries to get access to secure, system intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks are selfpropagating, as in the …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • G08B29/18Prevention or correction of operating errors
    • G08B29/183Single detectors using dual technologies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
US7398389B2 (en) Kernel-based network security infrastructure
Kurundkar et al. Network intrusion detection using Snort
Singh et al. Analysis of host-based and network-based intrusion detection system
Marinova-Boncheva A short survey of intrusion detection systems
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Ádám et al. Artificial neural network based IDS
Thakare et al. IDS: Intrusion detection system the survey of information security
Buchanan Introduction to security and network forensics
Resmi et al. Intrusion detection system techniques and tools: A survey
Adiwal et al. Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
Bendiab et al. IoT Security Frameworks and Countermeasures
Allan Intrusion Detection Systems (IDSs): Perspective
Ahmed et al. MICIE: a model for identifying and collecting intrusion evidences
Singh et al. A review on intrusion detection system
Harale et al. Network based intrusion detection and prevention systems: Attack classification, methodologies and tools
Noureldien et al. On firewalls evaluation criteria
Kumar et al. Recent advances in intrusion detection systems: An analytical evaluation and comparative study
Asarcıklı Firewall monitoring using intrusion detection systems
El Hayat Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System
Yadav et al. Comparison between HIDS and NIDS
Pasha A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company
Lawal et al. Managing Network Security with Snort Open Source Intrusion Detection Tools
Sharma et al. Analysis of IDS Tools & Techniques
Kalu et al. Combining Host-based and network-based intrusion detection system: A cost effective tool for managing intrusion detection
Ambika et al. Architecture for real time monitoring and modeling of network behavior for enhanced security
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载