Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
With the emerging of highly advance technology, risks in systems are also increases which even cannot be prevented by many security measures. Attacks in different form are being used to exploit the system through network. Intrusion Detection System (IDS) is used to detect the intrusion from such attack. IDS have certain limitation to detect and response in timely manner as well as to prevent the intrusion. On the other hand, IDS does not have the capability to capture the state of the system when an intrusion is detected Therefore it fails to preserve the evidences against the attack in original form and hence, digital evidence which is necessary in judicial proceedings for legal purpose cannot be produced in the court. The existing system used automatic digital forensic tool to capture the state of system when the intrusion occurs. But the damage control is yet to be considered. If the Alert log generated by IDS is altered tracking of intrusion will be fail. Our Primary aim is to focus on mitigation of damages done by an intrusion using firewall. We also used database to store the output log on another system to secure it.
Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping
Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping
Functional Broadside Test Generation for Fault Analysis
When the clock frequency of the integrated circuits increases, timing related defects may occur and it is necessary to find them. The timing defects are modeled by delay faults. Transition faults are used as the delay fa...
Eve Teasing and Molestation
Despite the jocular connotations Eve teasing and Molestation is a serious issue now a days. Eve teasing is a euphemism used in India for sexual harassment or molestation of women by men. It is an action of perversion lik...
Design of Application to Detect Images Embedded with Malicious Programs
In today’s world, malware can be propagated to victim systems in an increasingly diverse number of ways. One of these methods involves the passive distribution of malware by embedding in JPEG images which goes on to high...
A Review Paper of Improving Task Division Assignment Using Heuristics
This paper presents an innovative idea of distributing the tasks to their best processor to reduce the execution time of task by using various scheduling techniques. This paper presents hybrid scheduling techniques which...