Paper Title

Intrusion Detection Techniques and Open Source Intrusion Detection (IDS) Tools

Authors

  • Rana M Pir

Keywords

Intrusion detection system, Intrusion prevention system, HIDS, NIDS, DoS, DDoS, DIDS, Intrusions, cloud security, vulnerabilities, anomaly detection, IDS, Network Attacks

Abstract

Network based technology and Cloud Computing is becoming popular day by day as many enterprise applications and data are moving into cloud or Network based platforms. Because of the distributed and easy accessible nature, these services are provided over the Internet using known networking protocols, Protocol standards and Protocol formats under the supervision of different management’s tools and programming language. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion so many Attacks like Denial of Service (DDOS), Buffer overflows, Sniffer attacks and Application-Layer attacks have become a common issue today. Recent security incidents and analysis Have manual response to such attacks and resolve that attacks are no longer feasible. In Internet and Network system application or platform facing various types of attacks in every day. Firewalls security and spam filters are in place but they have simple rules such as to allow or deny protocols, ports or IP addresses. Some DoS and other attacks are too complex for today’s firewalls, so firewalls cannot prevent that all attacks. In this paper we define and discuss various types and techniques of Intrusion Detection, Intrusion Prevention and the IDS tools that are employed to detect these attacks and discuss some open source tools to prevent and detection of intrusion and how can we use Open Source tools in our system.

Article Type

Published

How To Cite

Rana M Pir. "Intrusion Detection Techniques and Open Source Intrusion Detection (IDS) Tools".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.2, Issue 3, pp.3290-3295, URL :https://rjwave.org/ijedr/papers/IJEDR1403077.pdf

Issue

Volume 2 Issue 3 

Pages. 3290-3295

Article Preview