07-07-2012, 02:23 PM
Intruders Attacks
Intruders Attacks.pptx (Size: 560.23 KB / Downloads: 28)
Types Of Intruders Attacks
Attempted break-ins
Penetrations of the security control system
Leakage
Denial of service
Malicious use
Masquerade attacks
IDSs Classification
IDSs operate as:
network-based
host-based
All IDSs use one of two detection methods:
Signature-based
Statistical anomaly-based
What are Anomalies?
Anomaly is a pattern in the data that does not conform to the expected behavior
Also referred to as outliers, exceptions, peculiarities, surprise, etc.
Anomalies translate to significant (often critical) real life entities
Cyber intrusions
Credit card fraud
Anomaly Detection –
Anomaly based systems are “learning” systems in a sense that they work by continuously creating “norms” of activities. These norms are then later used to detect anomalies that might indicate an intrusion.
Anomaly detection compares observed activity against expected normal usage profiles “leaned”. The profiles may be developed for users, groups of users, applications, or system resource usage.
Basic Module
Every user has an unique Email id and password .
When a user have a password and the Email id then network scanning and user behavior methods will enable us to identify the intruder.
The network scanning will provide us the information whether the user is in our country, region or in which area.
If the intruder is from outside he will be asked some security questions.
The path is saved in such a way that if the intruder is not following the right path then he will be asked again some security questions.