Logo
Nazad
Ibrahim Kinal, Kemal Hajdarevic
0 24. 5. 2013.

OPEN SOURCE INTRUSION DETECTION SYSTEM USING SNORT

Keywords: Snort, IDS, Intrusion Detection System, Intrusion. ABSTRACT Software and hardware components are parts of almost every Intrusion Detection System (IDS) which is able to monitor computer networks for any possible security incidents. Using Internet resources all over the world has been becoming as one of the most popular task among all people and this usage and connection to Internet creates security risk for many different network attacks. Since these attacks and threats can strongly affects network security. IDS has become one of the most useful network security system which helps users to protect their valuable resource and their, integrity and availability of information located in the protected part of any organization’s computer network. Therefore, IDS system has a very significant role protect users, companies or any institutions to detect cases. IDS can be designed as signature-based or anomaly-based detection system. Signature-based system is only eligible to detects attacks which are already known and anomaly-based systems are eligible to detect unknown attacks which give them functionality to be proactive i.e. to resolve attack before it harm specific protected system.


Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više