Please download to get full document.

View again

of 71

DESIGN & IMPLEMENTATION OF LAYERED SIGNATURE BASED INTRUSION DETECTION SYSTEM USING SNORT

The thesis analyzes the ways of IDS which stands for Intrusion Detection System works. The basic aim of an Intrusion Detection System is to protect a computer network or system from unauthorized access of attacks. Different types of IDS are also
0 views71 pages
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Documenttranscript
    BY NOOR FARJANA FIROJ ID:123-31-139   This Report Presented in Partial Fulfillment of the Requirements for the Degree of Masters’ of Science in Electronics and Telecommunication Engineering.  Supervised By Md. Taslim Arefin   Associate Professor and Head   Department of ETE Daffodil International University   DESIGN & IMPLEMENTATION OF LAYERED SIGNATURE BASED INTRUSION DETECTION SYSTEM USING SNORT DAFFODIL INTERNATIONAL UNIVERSITY DHAKA, BANGLADESH MAY, 2019  1 | Page   2 | Page  DECLARATION I hereby declare that, this project has been done by me under the supervision of Md. Taslim Arefin, Associate Professor and Head, Department of ETE Daffodil International University. I also declare that neither this project nor any part of this project has been submitted elsewhere for award of any degree or diploma.   Supervised by: Name: Md. Taslim Arefin Designation: Associate Professor and Head Department of ETE Daffodil International University Submitted by: Noor Farjana Firoj ID: -123-31-139 Department of ETE Daffodil International University  3 | Page  ACKNOWLEDGEMENT   At first I would like to be thankful to Almighty Allah as for his gratefulness and divine blessings it become possible for me to finally complete this project. My gratitude to Supervisor Md. Taslim Arefin , Associate Professor and Head,  Department of ETE Daffodil International University, Dhaka. His endless patience, scholarly guidance, continual encouragement, constant and energetic supervision, constructive criticism, valuable advice, reading many inferior draft and correcting them at all stages have made it possible to complete this project. I would Like to thank the teachers, the staffs and entire ETE department of Daffodil University to make it possible for me. Finally, I must acknowledge with due respect the constant support and patients of my family.  4 | Page  ABSTRACT The thesis analyzes the ways of IDS which stands for Intrusion Detection System works. The basic aim of an Intrusion Detection System is to protect a computer network or system from unauthorized access of attacks. Different types of IDS are also compared and criticized in this thesis which explore the vulnerability of the system. Different detection techniques have been discussed on network based IDS. The study has been done on the operational procedures of Network based open source IDS tool Snort. It is a lightweight network based intrusion detection system, which read every incoming/outgoing packets through a network and alert the admin accordingly. To check every packets, Snort use a central database system of signature. Here in this paper a layered database system has been proposed to upgrade the system performance. An analytical operation has been conveyed on the proposed solution and compared with the existing standard system. Future scopes, further development, pros and cons also have been discussed.
Advertisement
MostRelated
View more
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x