Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Empirical Analysis of User’s Log Activities for Misuse Detection: A SNORT Based Study  
  Authors : Sunil Jadhav; Dr. G.D.Kurundkar; Dr. Santosh Khamitkar; Pawan Wasnik
  Cite as:

 

In Information Security, an Intrusion Detection Systems (IDS) works like a thief alarm and detects destruction activates. Intrusion Detection and Prevention System (IDPS) is a new technology for IDS. Our present study is based on IDPS approach using SNORT tool. Here we have collected access logs and historical activities of user on the system and then by using data analysis methods, the Intruders are found out.

 

Published In : IJCSN Journal Volume 5, Issue 5

Date of Publication : October 2016

Pages : 836-841

Figures :--

Tables :02

 

Sunil Jadhav : System Expert, S.R.T.M.University ,Nanded, MS, 431606

Dr. G.D.Kurundkar : Department of Computer Sceicne, S.G.B.S College, Purna, Dist. Parbhani, MS,India

Dr. Santosh Khamitkar : School of Computational Sciecnes, S.R.T.M.University, Nanded, MS, 431606, India.

Pawan Wasnik : School of Computational Sciecnes, S.R.T.M.University, Nanded, MS, 431606, India.

 

 

 

 

 

 

 

Abnormal Behavior, SNORT, Signature Identification, NIDS, HIDS

The paper attempts to summarize our practical work on using SNORT for misuse detection. It provides solution to various environments that can happen in the form of intrusion by developing user defined signatures. We can use and develop signatures to detect suspicious attacks by user logs and activities user. It is observed that to find out the behavioral change of user from Normal to Intruder and vice versa can be asserted by using data set of last Day as reference set rather than the data set of more than one week.

 

1. A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems in International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 6,August 2012, ISSN : 2278 –1021 by Pritika Mehra. 2. Dynamic Multi Layer Signature Based Intrusion Detection System Using Mobile Agents by Mueen Uddin1, Kamran Khowaja2 and Azizah Abdul Rehman in International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010 PP.129-141. 3. Liabotis, O. Prnjat, T. Olukemi, A. Ching, A. Lazarevic, L. Sacks, M. Fisher, and P. MacKee, “Self - organizing management of grid environments,” in Proc. Int. S. Telecommunications, Isfahan, Iran, 2003. 4. K. Kendall, A Database of Computer Attacks for the Eva luation of Intrusion Detection Systems, Master?s Thesis, Department of Electrical Engineering and Computer Science, Massachusets Institute of Technology (MIT), Cambridge, MA,USA, June 1999.