Abstract :
An intrusion is somebody attempting to
break into or misuse your system. The word "misuse" is broad, and can
reflect something severe as stealing confidential data to something minor such
as misusing your email system for Spam. Localization Allows subscribers to
obtain information relevant to their current location.
Intrusion Detection Systems is a topic that has recently garnered much interest in the
computer security community. In the last few years, this interest level has
spurred the development of a variety of approaches to providing IDS
capabilities that are both reliable and low-impact in terms of management or
cost. When presented with different types of IDS one might be tempted to assume
that one approach or another was inherently superior. In fact, the mixture of
approaches used for IDS offers the security analyst a unique opportunity in
terms of the synergies inherent in combined techniques. Intrusion Detection
Systems are like a burglar alarm for your computer network. They detect
unathorized access attempts. They are the first line of defence for your
computer systems.
A correct
firewall policy can minimize the exposure of many networks however they are
quite useless against attacks launched from within. Hackers are also evolving
their attacks and network subversion methods. These techniques include email
based Trojan, stealth scanning techniques, malicious code and actual attacks,
which bypass firewall policies by tunneling access over allowed protocols such
as ICMP, HTTP, DNS, etc. Hackers are also very good at creating and releasing
malware for the ever-growing list of application vulnerabilities to compromise
the few services that are being let through by a firewall.
Download :
Download :