Review of Alerts Generated for the Particular Attacks
Pages : 1915-1918
Download PDF
Abstract
Since the earlier days of human civilization, the need to keep data safe and secret is around. Several methodologies and later technologies have been devised and used for the same purpose. But the whole concept of securing data from unwanted attacks took a big turn with the widespread of Internet. Although internet provides uncountable benefits like emails, world-wide availability of information, video conferencing, e-commerce, etc; but it is also the biggest tool for hackers and crackers who may use sensitive data and information for their selfish purposes. A major methodology for protection of data is Intrusion detection which is one of the prime areas of research today. This paper surveys the existing literature on types of Intrusion, existing techniques and architectures used for their detection. This paper uses Snort tool for traffic analysis and comparison of alerts generated for the particular attack with respect to several protocols.
Keywords: Gigabit, IDS, services, domain, intrusion, snort, prevention, Detection, techniques
Article published in International Journal of Current Engineering and Technology, Vol.7, No.5 (Sept/Oct 2017)