Application Layer Based Packet Analysis And Intrusion Detection
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 4
Abstract
Network forensics is basically a new approach when it comes to the network information security, because the IDS and firewall cannot always discover and stop the misuse in the whole network. This proposed work is used to capture and analyze the data exchanged among the many different IP traceback techniques like packet marking that assist a forensic investigator to recognize the promicious ip source packets. The proposed network forensics only focus on the network traffic capture,arp spoofing,mac spoofing,attack alerting and traffic replay, that often results in the performance of forensics analysis difficulties. In this particular paper, the frameworks of distributed real time network intrusion forensics system, that's deployed in local area network environment is analyzed and investigated.
Authors and Affiliations
BONTHAGORLA VENKATA KOTESWARAO#1 , SHAIK SALMA BEGUM#2
Hiding Messages Using Motion Vector Technique In Video Steganography
Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be...
A Review on Network Intrusion Detection System
Internet and computer networks are exposed to an increasing number of security threats. For new types of attacks are emerging constantly, developing flexibility and adaptability safety-oriented approaches is a serious pr...
Monitoring and Control System for Industrial Parameters Using Can Bus
In modern industrial production, the working temperature change reflects the operating status of equipments and change of many physical characteristics. So the temperature is an important parameter, which needs to be mon...
A Full swing Ex-OR/Ex-NOR Gate Circuit Using Pass Transistor Logic with Five Transistors
The Ex-OR/Ex-NOR gates are the basic building blocks of various digital system applications like adder, comparator, and parity generator/checker and encryption processor. This paper proposes a 5T full swing pass transist...
From Bricks To Blocks: A Masonary Unit From Western Gujarat Region Of India
The conventional masonry unit used is clay bricks for construction of masonry works but with advancement of time these clay bricks were replaced by fly ash bricks of same size and shape. But the masonry unit used f...