Author(s):
1. Asim Irfan:
Department of Computer Systems Engineering, Mehran univeristy of Engineering and Technology,Jamshoro,Pakistan
2. Osama Ahmed Khan:
Department of Computer Systems Engineering, Mehran univeristy of Engineering and Technology,Jamshoro,Pakistan
3. Naresh Kumar:
Department of Computer Systems Engineering, Mehran univeristy of Engineering and Technology,Jamshoro,Pakistan
4. Mitho Khan Alias Umed Ali:
Department of Computer Systems Engineering, Mehran univeristy of Engineering and Technology,Jamshoro,Pakistan
Abstract:
We are currently in an information and technological age. Although the Internet has made life for humans easier and more comfortable, everything has a price. We all witness individuals getting hacked and their personal belongings being exposed online; privacy theft has become an inevitable part of life. The problem with this is that an unauthorized entry into the network might harm the user by accessing their data. The creation of an intrusion detection system that will improve network security is the aim of this project. For this, we'll make use of the opensource IDS snort. The literature review section discusses all of the research that was conducted before and after the pre and postdevelopment of the project. There is a detailed discussion of the intrusion detection system as well as its research. The use of the Waterfall Model as the approach for producing this project will be covered in the methodology section. The preliminary findings from the literature review research, the author's research, and the system use case diagrams are included in the results and discussions section. The development of the prototype and its outcomes, as well as the findings of the testing, will then be thoroughly described. Every defense is presented with clarity. All pertinent suggestions and some upgrades that can be made for the project's future are included and explained in the recommendations section. The complete project is wrapped up in the concluding section. An in-depth discussion is also being had over the project phases. The project will concentrate on creating a Linux-based network intrusion detection system using snort IDS.
Page(s):
1-1
DOI:
DOI not available
Published:
Journal: Second International Conference on Computing Technologies, Tools and Applications (ICTAPP-24), June 4-6,2024 (Abstract Book), Volume: 0, Issue: 0, Year: 2024
Keywords:
Intrusion Detection System
,
IDS
,
Portable Network
,
Linuxbased Network
References:
References are not available for this document.
Citations
Citations are not available for this document.