International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 45 | Number 1 | Year 2017 | Article Id. IJCTT-V45P101 | DOI : https://doi.org/10.14445/22312803/IJCTT-V45P101

Intrusion Detection a Challenge: SNORT the savior


Gurven Vaseer, Dr. Pushpinder Singh Patheja

Citation :

Gurven Vaseer, Dr. Pushpinder Singh Patheja, "Intrusion Detection a Challenge: SNORT the savior," International Journal of Computer Trends and Technology (IJCTT), vol. 45, no. 1, pp. 1-3, 2017. Crossref, https://doi.org/10.14445/22312803/IJCTT-V45P101

Abstract

Technology has become an integral part of our life. With the incredible advancements in the field of technology encompassing networking and security concepts, we are still lacking in protecting our devices from thefts/attacks. This is becoming a grave challenge for organizations/institutes, hence by this paper we are able to use Snort as a tool for detecting attacks and generating standard rules that can be implemented and thus will minimize security breaches.

Keywords

Intrusion Detection System, IP packet, ICMP packet.

References

1] K. Jungwon, J. B. Peter, A. Uwe, G. Julie, T. Gianni and T. Jamie, “Immune System Approaches to Intrusion Detection – A Review”, Natural Computing: an international journal, vol. 6, Issue 4, (2007) December.
[2] E. J. Derrick, R. W. Tibbs and L. L. Reynolds, “Investigating New Approaches to Data Collection, Management and Analysis for Network Intrusion Detection”, ACMSE, Winston-Salem, N. Carolina, USA, (2007) March 23-24, pp. 283-287.
[3] Forouzan, Behrouz A. (2007). Data Communications And Networking (Fourth ed.). Boston: McGraw-Hill. pp. 621–630. ISBN 0- 07-296775-7.
[4] Christopher Low –“Understanding Wireless attacks & detection “-GIAC Security Essentials Certification (GSEC) Practical Assignment 13 April 2005 -SANS Institute InfoSec Reading Room