Intrusion Detection a Challenge: SNORT the savior
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2017 by IJCTT Journal|
|Year of Publication : 2017|
|Authors : Gurven Vaseer, Dr. Pushpinder Singh Patheja|
|DOI : 10.14445/22312803/IJCTT-V45P101|
Gurven Vaseer, Dr. Pushpinder Singh Patheja "Intrusion Detection a Challenge: SNORT the savior". International Journal of Computer Trends and Technology (IJCTT) V45(1):1-3, March 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Technology has become an integral part of our life. With the incredible advancements in the field of technology encompassing networking and security concepts, we are still lacking in protecting our devices from thefts/attacks. This is becoming a grave challenge for organizations/institutes, hence by this paper we are able to use Snort as a tool for detecting attacks and generating standard rules that can be implemented and thus will minimize security breaches.
1] K. Jungwon, J. B. Peter, A. Uwe, G. Julie, T. Gianni and T. Jamie, “Immune System Approaches to Intrusion Detection – A Review”, Natural Computing: an international journal, vol. 6, Issue 4, (2007) December.
 E. J. Derrick, R. W. Tibbs and L. L. Reynolds, “Investigating New Approaches to Data Collection, Management and Analysis for Network Intrusion Detection”, ACMSE, Winston-Salem, N. Carolina, USA, (2007) March 23-24, pp. 283-287.
 Forouzan, Behrouz A. (2007). Data Communications And Networking (Fourth ed.). Boston: McGraw-Hill. pp. 621–630. ISBN 0- 07-296775-7.
 Christopher Low –“Understanding Wireless attacks & detection “-GIAC Security Essentials Certification (GSEC) Practical Assignment 13 April 2005 -SANS Institute InfoSec Reading Room
Intrusion Detection System, IP packet, ICMP packet.