Home > INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION
INTRUSION
DETECTION INTRUSION
DETECTION INTRUSION
DETECTION
INTRUSION
DETECTION
INTRUSION DETECTION
INTRUSION DETECTION
INTRUSION DETECTION
INTRUSION
DETECTION
DETECTION
INTRUSION
DETECTION
INTRUSION
DETECTION INTRUSION
DETECTION
INTRUSION
DETECTION
INTRUSION
DETECTION
INTRUSION
DETECTION
INTRUSION
DETECTION
INTRUSION
DETECTION INTRUSION
DETECTION INTRUSION
DETECTION
INTRUSION
DETECTION
INTRUSION DETECTION
INTRUSION DETECTION
INTRUSION DETECTION
INTRUSION
DETECTION
DETECTION
INTRUSION
DETECTION
INTRUSION
DETECTION INTRUSION
DETECTION
INTRUSION DETECTION
A
presentation over term paper
on
intrusion detection
by
anuja jain
(MS in computer
science)
monica achury
(MS in computer
science)
Definition
INTRUSION
- The potential possibility of a deliberate unauthorized attempt to:
INTRUSION DETECTION
- The process of identifying and responding to intrusion activities
Types
of Intrusion
There are six
types of Intrusions
Ex:- NIDES,
MIDAS, STAT
Intrusion Detection Techniques
Anomaly Detection Systems
Anomaly
Detection
activity measures
probable intrusion
Relatively high false positive rate - anomalies can just be new normal activities.
Misuse
Detection Systems
Misuse
Detection
Intrusion Patterns
activities
pattern matching
intrusion
Can��t
detect new attacks
Example: if (src_ip == dst_ip) then ��land attack��
IDS Design
Components
of IDS
Audit Data Preprocessor
Audit Records
Activity Data
Detection
Models
Detection Engine
Alarms
Decision
Table
Decision Engine
Action/Report
system activities are
observable
normal and intrusive
activities have distinct evidence
Important
Features
Continued��
Data
Mining
Definition:
The semi-automatic discovery of patterns, associations, changes,
anomalies, rules, and statically significant structures and events in
data.
Data such as,
Data
Mining Algorithms
Extract knowledge in the form of models
from data.
Data
Mining Techniques
It allows the system to collect useful knowledge that describes a user��s or program��s behavior from large audit data sets.
Examples:
IDS
Evaluation
IDS for Mobile Wireless Systems
Designing
for Wireless Networks
Problems with Wireless
Networks
One
proposed IDS design by Georgia Institute of Technology
references
Questions???
All Rights Reserved Powered by Free Document Search and Download
Copyright © 2011