首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:A Novel Methodology to identify the Intruders and Attackers in the Network with Snort
  • 本地全文:下载
  • 作者:Bathala Subbarayudu ; Dr.R.China Appala Naidu ; K.Meghana
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2015
  • 卷号:3
  • 期号:9
  • DOI:10.15680/IJIRCCE.2015. 0309125
  • 出版社:S&S Publications
  • 摘要:Now a day‟s Intrusions are the most important issues in the current internet environment. The objectiveis to gain access to a system and steal valuable information or to increase the range of privileges accessible on a system.Attackers use system or vulnerabilities software that allow a user to execute code that opens a backdoor into thesystem. Gentle intruder‟s strength is allowable, even though they do devour resources and may slow the performancefor legitimate users. However, here is no way to go forward to know whether an intruder will kind or malign.Consequently, even for systems with no mainly responsive resources, there is an inspiration to control this problem.Intruder can attack in any way. Suppose an intruder wants to access some organization valuable information. If thatparticular organization is fully secured, then there is no way of stealing the information. If not, the problem rises. In ourproposed system the security can be provided in such a way that the organizational network contains rule sets.According to the rule sets only the connection has to be made between the organization systems and other systems andwith the rule set we can identify the intruders or attackers in the network
  • 关键词:Intruder; IDS; Main system; Rule sets; Snort.
国家哲学社会科学文献中心版权所有