Header menu link for other important links
Log Based Intrusion Detection System
Published in International Organization Of Scientific Research (IOSR)
Volume: 20.0
Issue: 5.0
Pages: 15.0 - 22.0
The idea of making everything readily available and universally has led to a revolution in the field of networks. In spite of the tremendous growth of technologies in the field of networks and information, we still lack in preventing our resources from cyber-attacks. This may not concern small organizations but it is a serious issue as far as industries, companies or national securities are concerned. Since many different mechanisms were opted by organizations in the form of intrusion detection and prevention systems to protect themselves from these kinds of attacks, there are many security breaches which go undetected. A host-based intrusion detection system (HIDS) is a system that monitors a computer system on which it is installed to detect an intrusion and/or misuse, and responds by logging the activity and notifying the designated authority. In this paper, we develop a HIDS using logs generated by services running on the systems. We will discuss about the client-server architecture used in HIDS.
About the journal
JournalIOSR Journal of Computer Engineering (IOSR-JCE)
PublisherInternational Organization Of Scientific Research (IOSR)
Open Access0