Research In Motion
A set of rules are used to detect or prevent the hostile data traffic in a network. In dynamic computing environment, security challenges are increasing day-by-day. It is so important to detect the abnormal behavior in a packet. There are lots of techniques and tools are used to determine the suspicious behavior. In this paper, the authors have used snort as an IDS engine to detect the signature of packet using rules. Any type of Virus, worm or say infected packet have some sort of signature.