Intrusion Detection System Using SNORT

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 04 | Apr -2017

p-ISSN: 2395-0072

www.irjet.net

Intrusion Detection System Using SNORT Rishabh Gupta1, Soumya Singh2, Shubham Verma3, Swasti Singhal4 1UG

Scholar, Dept. of IT, GCET, Greater Noida, UP, India Scholar, Dept. of IT, GCET, Greater Noida, UP, India 3UG Scholar, Dept. of IT, GCET, Greater Noida, UP, India 4Assistant Professor, Dept. of IT, GCET, Greater Noida, UP, India Galgotias College of Engineering and Technology ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract - Nowadays corporate company’s network can 2. Intrusion Detection System 2UG

generate false alarms and are a major target of exploits. They have lots of sensitive data which can be misused to leak information which are critical to the company and its employees. In order to avoid these kinds of attack, companies use Intrusion Detection System. Intrusion Detection System (IDS) inspects every packet passing through the network and raise alarm if these is any attempt to perform malicious activity. IDS ensure a security policy in every single packet passing through the network. Snort is an open- source , lightweight tool which captures every detail of packet passing through the network and generate alerts if any one packets matches the signatures inserted given by the company. The signatures are basically the rules written so that IDS can know on which packets it should generate the alert. In this paper we have implemented Intrusion Detection System using Snort in order to detect signature based network attacks.

Key Words: Intrusion Detection System, Snort, Signaturebased, barnyard, Anomaly-based

Intrusion detection system (ID) is a type of security system for computers and computer networks. Intrusion Detection basically helps in detecting outer and inner attacks performed by either user or hackers. An ID system collects information from various sources and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization). ID uses vulnerability assessment (sometimes referred to as scanning), which is a technology developed to assess the security of a computer system or network

Advantages of IDS    

Track any changes in the behavior of network. Inspects system activity Can differentiate between normal and abnormal activities in the network Automated

1. INTRODUCTION Disadvantages of IDS Network security is one of the biggest challenges that companies are facing from time to time. There are lots of attempts by the black hat hackers to break and compromise with the security of Company’s network and some of them are even successful. As the use of internet increasing, these malicious activities are gaining popularity among the black hats.

  

Sometimes gives false alarms i.e. the packet wasn't malicious but IDS might still generate an alert. Time consuming Is not 100% safe from attacks

Everyday large amount of data is being generated and passed on and lots of these data holds sensitive information about the company and its employees. Thus securing network is one of the most important task for a company to survive .To make this easier and efficient we use Intrusion Detection System , it helps to collect information about any malicious packet that passes across a company's network.

© 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 2100


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Intrusion Detection System Using SNORT by IRJET Journal - Issuu