OPEN SOURCE INTRUSION DETECTION SYSTEM USING SNORT

Dublin Core

Title

OPEN SOURCE INTRUSION DETECTION SYSTEM USING SNORT

Author

KINAL, Ibrahim
HAJDAREVIC, Kemal

Abstract

Keywords: Snort, IDS, Intrusion Detection System, Intrusion. ABSTRACT Software and hardware components are parts of almost every Intrusion Detection System (IDS) which is able to monitor computer networks for any possible security incidents. Using Internet resources all over the world has been becoming as one of the most popular task among all people and this usage and connection to Internet creates security risk for many different network attacks. Since these attacks and threats can strongly affects network security. IDS has become one of the most useful network security system which helps users to protect their valuable resource and their, integrity and availability of information located in the protected part of any organization’s computer network. Therefore, IDS system has a very significant role protect users, companies or any institutions to detect cases. IDS can be designed as signature-based or anomaly-based detection system. Signature-based system is only eligible to detects attacks which are already known and anomaly-based systems are eligible to detect unknown attacks which give them functionality to be proactive i.e. to resolve attack before it harm specific protected system.

Keywords

Article
PeerReviewed

Identifier

ISSN 2233-1565

Publisher

International Burch University

Date

2013-05-24

Extent

2149