Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

With the emerging of highly advance technology, risks in systems are also increases which even cannot be prevented by many security measures. Attacks in different form are being used to exploit the system through network. Intrusion Detection System (IDS) is used to detect the intrusion from such attack. IDS have certain limitation to detect and response in timely manner as well as to prevent the intrusion. On the other hand, IDS does not have the capability to capture the state of the system when an intrusion is detected Therefore it fails to preserve the evidences against the attack in original form and hence, digital evidence which is necessary in judicial proceedings for legal purpose cannot be produced in the court. The existing system used automatic digital forensic tool to capture the state of system when the intrusion occurs. But the damage control is yet to be considered. If the Alert log generated by IDS is altered tracking of intrusion will be fail. Our Primary aim is to focus on mitigation of damages done by an intrusion using firewall. We also used database to store the output log on another system to secure it.

Authors and Affiliations

Keywords

Related Articles

European Union: An Integration Exporter or an Actor Sui Generis

"The European Union was formed after the Second World War in search of peace and to help Europe stand up on its feet economically. Starting from a six nation organisation, today it is a 28 member organisation. It is one...

Mobile Cloud Computing

With an explosive growth of the mobile applications and emerging of cloud computing concept, the Mobile Cloud Computing (MCC) has become a potential technology for the mobile service users. The concepts of Cloud computin...

Fault Tolerant Linear State Machine Design Approach for Safety Critical Systems Implemented on FPGA

: In this paper, a new method for the design of fault tolerant linear state machines with initial state 0 and one dimensional input and one-dimensional output is proposed. It is shown that the LFSR-implementation of the...

Structural and Physical Properties of Cu¬¬0.12Mn¬¬¬¬0.88Fe2O4 Prepared by Combustion Technique

Structural and Physical Properties of Cu¬¬0.12Mn¬¬¬¬0.88Fe2O4 Prepared by Combustion Technique

Composition and Thickness Dependent Hall Coefficient, mobility and Carrier Concentration of Vacuum Evaporated Ag-Te Thin Films

"Abstract: Thin films of Ag-Te compound of varying composition and thicknesses have been formed on glass substrates employing three temperature method. The Hall voltage at different magnetic fields of various...

Download PDF file
  • EP ID EP357957
  • DOI -
  • Views 148
  • Downloads 0

How To Cite

(2015). Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357957