Implementation of Signature-based Detection System using Snort in Windows

Download Now
Provided by: Academic Science
Topic: Security
Format: PDF
Threats of attacks are increasing day-by-day with the rapid use of internet technology. Intrusion Detection Systems (IDS) are the key components in ensuring the safety of systems and networks. These systems enforce a security policy by inspecting arriving packets for known signatures (patterns). Signature-based detection is used for detecting known attacks as many attacks have distinct signatures. Signatures may be present in different parts of a data packet depending upon the nature of the attack.
Download Now

Find By Topic