In Information Security, an Intrusion
Detection Systems (IDS) works like a thief alarm and
detects destruction activates. Intrusion Detection and
Prevention System (IDPS) is a new technology for IDS.
Our present study is based on IDPS approach using
SNORT tool. Here we have collected access logs and
historical activities of user on the system and then by using
data analysis methods, the Intruders are found out.
Published In:IJCSN Journal Volume 5, Issue 5
Date of Publication : October 2016
Pages : 836-841
Figures :--
Tables :02
Sunil Jadhav : System Expert, S.R.T.M.University ,Nanded, MS, 431606
Dr. G.D.Kurundkar : Department of Computer Sceicne, S.G.B.S College, Purna, Dist. Parbhani, MS,India
Dr. Santosh Khamitkar : School of Computational Sciecnes, S.R.T.M.University, Nanded, MS, 431606, India.
Pawan Wasnik : School of Computational Sciecnes, S.R.T.M.University, Nanded, MS, 431606, India.
The paper attempts to summarize our practical work on
using SNORT for misuse detection. It provides solution
to various environments that can happen in the form of
intrusion by developing user defined signatures. We can
use and develop signatures to detect suspicious attacks
by user logs and activities user. It is observed that to find
out the behavioral change of user from Normal to Intruder and vice versa can be asserted by using data set
of last Day as reference set rather than the data set of
more than one week.
1. A brief study and comparison of Snort and Bro Open
Source Network Intrusion Detection Systems in
International Journal of Advanced Research in
Computer and Communication Engineering Vol. 1,
Issue 6,August 2012, ISSN : 2278 –1021 by Pritika
Mehra.
2. Dynamic Multi Layer Signature Based Intrusion
Detection System Using Mobile Agents by Mueen
Uddin1, Kamran Khowaja2 and Azizah Abdul
Rehman in International Journal of Network Security
& Its Applications (IJNSA), Vol.2, No.4, October
2010 PP.129-141.
3. Liabotis, O. Prnjat, T. Olukemi, A. Ching, A.
Lazarevic, L. Sacks, M. Fisher, and P. MacKee,
“Self - organizing management of grid environments,”
in Proc. Int. S. Telecommunications, Isfahan, Iran,
2003.
4. K. Kendall, A Database of Computer Attacks for
the Eva luation of Intrusion Detection Systems,
Master?s Thesis, Department of Electrical
Engineering and Computer Science, Massachusets
Institute of Technology (MIT), Cambridge,
MA,USA, June 1999.