Research Article | Open Access | Download PDF
Volume 45 | Number 1 | Year 2017 | Article Id. IJCTT-V45P101 | DOI : https://doi.org/10.14445/22312803/IJCTT-V45P101
Intrusion Detection a Challenge: SNORT the savior
Gurven Vaseer, Dr. Pushpinder Singh Patheja
Citation :
Gurven Vaseer, Dr. Pushpinder Singh Patheja, "Intrusion Detection a Challenge: SNORT the savior," International Journal of Computer Trends and Technology (IJCTT), vol. 45, no. 1, pp. 1-3, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V45P101
Abstract
Technology has become an integral part of our life. With the incredible advancements in the field of technology encompassing networking and security concepts, we are still lacking in protecting our devices from thefts/attacks. This is becoming a grave challenge for organizations/institutes, hence by this paper we are able to use Snort as a tool for detecting attacks and generating standard rules that can be implemented and thus will minimize security breaches.
Keywords
Intrusion Detection System, IP packet, ICMP packet.
References
1] K. Jungwon, J. B. Peter, A. Uwe, G. Julie, T. Gianni and T. Jamie, “Immune System Approaches to Intrusion Detection – A Review”, Natural Computing: an international journal, vol. 6, Issue 4, (2007) December.
[2] E. J. Derrick, R. W. Tibbs and L. L. Reynolds, “Investigating New Approaches to Data Collection, Management and Analysis for Network Intrusion Detection”, ACMSE, Winston-Salem, N. Carolina, USA, (2007) March 23-24, pp. 283-287.
[3] Forouzan, Behrouz A. (2007). Data Communications And Networking (Fourth ed.). Boston: McGraw-Hill. pp. 621–630. ISBN 0- 07-296775-7.
[4] Christopher Low –“Understanding Wireless attacks & detection “-GIAC Security Essentials Certification (GSEC) Practical Assignment 13 April 2005 -SANS Institute InfoSec Reading Room