Kurundkar et al., 2012 - Google Patents
Network intrusion detection using SnortKurundkar et al., 2012
View PDF- Document ID
- 3883680912989867101
- Author
- Kurundkar G
- Naik N
- Khamitkar S
- Publication year
- Publication venue
- International Journal of Engineering Research and Applications
External Links
Snippet
An intruder is a hacker or cracker which always tries to get access to secure, system intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks are selfpropagating, as in the …
- 238000001514 detection method 0 title abstract description 71
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/183—Single detectors using dual technologies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7398389B2 (en) | Kernel-based network security infrastructure | |
| Kurundkar et al. | Network intrusion detection using Snort | |
| Singh et al. | Analysis of host-based and network-based intrusion detection system | |
| Marinova-Boncheva | A short survey of intrusion detection systems | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Ádám et al. | Artificial neural network based IDS | |
| Thakare et al. | IDS: Intrusion detection system the survey of information security | |
| Buchanan | Introduction to security and network forensics | |
| Resmi et al. | Intrusion detection system techniques and tools: A survey | |
| Adiwal et al. | Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection | |
| Bendiab et al. | IoT Security Frameworks and Countermeasures | |
| Allan | Intrusion Detection Systems (IDSs): Perspective | |
| Ahmed et al. | MICIE: a model for identifying and collecting intrusion evidences | |
| Singh et al. | A review on intrusion detection system | |
| Harale et al. | Network based intrusion detection and prevention systems: Attack classification, methodologies and tools | |
| Noureldien et al. | On firewalls evaluation criteria | |
| Kumar et al. | Recent advances in intrusion detection systems: An analytical evaluation and comparative study | |
| Asarcıklı | Firewall monitoring using intrusion detection systems | |
| El Hayat | Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System | |
| Yadav et al. | Comparison between HIDS and NIDS | |
| Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
| Lawal et al. | Managing Network Security with Snort Open Source Intrusion Detection Tools | |
| Sharma et al. | Analysis of IDS Tools & Techniques | |
| Kalu et al. | Combining Host-based and network-based intrusion detection system: A cost effective tool for managing intrusion detection | |
| Ambika et al. | Architecture for real time monitoring and modeling of network behavior for enhanced security |