SlideShare a Scribd company logo
NADAR SARASWATHI COLLEGE OF ARTS&SCIENCE,THENI
DEPARTMENT OF COMPUTER SCIENCE&INFORMATION
TECHNOLOGY
V.VANMATHY
I-MSC(CS)
topic: intruder
INTRUDERS
 Any set of actions that attempt to compromise
the confidentiality, integrity, or availability of a
computer resource
 One of the most publicized attack to security is
the intruder, generally referred to a hacker or
cracker.
There classes of intruder are as follows:
 Masquerader
 Misfeasor
 Clandestine user
INTRUSION DETECTION
SYSTEM (IDS)
INTRUSION DELECTION
SYSTEM(IDS)
Intrusion detection I the process of identifying and
responding to malicious activity targeted at
resources
IDS is a system designed to test/analyze network
system traffic/events against a give set of
parameters and alert/capture data when these
IDS uses collected information and predefined
knowledge-based System reason about the
possibility of an intrusion.
IDS also provides services to cop with intrusion
such as giving alarms, activating programs to try
to deal with intrusion,etc.
FUNCTION OF IDS
 An IDS detects attacks as soon as possible and
takes appropriate action.
 An ID dose not usually take preventive measures
when an attack is detected
 It is a reactive rather than a pro-active agent
 It plays a role of informant rather than a police
officer.
PRINICIPLES OF INTRUCTION DETECTION
SYSTEM
 An IDS must run unattended for extended periods
of time
 The IDS must stay active and secure
 The IDS must be also to recognize unusual
activity
 The IDS must operate without unduly affecting
the system’s activity
 The IDS must be configurable
PRINCIPLES OF INTRUION DETECTION
SYSTEMS
COMPONENTS OF IDS
 Basically there are three components or modules
in an intrusion detection system:
 Sensor: responsible for capturing packets and
sending to the console class.
 Console: responsible for analyzing packets
captured by enor class.
 Its is the class responsible for displaying GUI and
generating alerts
TYPES OF IDS
 Network intrusion detection system(INDS)
 Protocol based intrusion detection system(PIDS)
 Application protocol based intrusion detection
system(APIDS)
 Host-based intrusion detection system(HIDS)
VIRUSES AND RELATED
THREATS
 Perhaps the most sophisticated types of threats
to computer systems are presented by program
that exploit vulnerabilities in computing systems.
 Malicious programs
Viruses
 Virus-vital information resources under seize
 A virus is a malware program that, when
executed, replicates by inserting copies of itself
into other computer programs, data files, or the
boot sector of the hard drive
Virus phases:
Dormant-waiting on trigger event
Propagation –replicating to programs/disks
Triggering-by event to execute payload
Execution- of payload
TYPES OF VIRUSES
VIRUS
COUNTERMEASURES
Viral attacks exploit lack of integrity control on
systems to defend need to add such controls
Typically by one or more of:
 Prevention-block virus infection mechanism
 Detection-of viruses in infected system
 Reaction – restoring system to clean state
VIRUS REMOVAL TECHIQUE
FIREWALL DESIGN
PRINCIPLES
 Information system undergo a steady evolution
(from small LAN’s to internet connectivity).
 Strong security features for all workstations and
servers not established.
 Effective means of protection a local system or
network of system from network _ based security
threats while affording access to the outside world
via WAN’s or the internet.
TYPES OF FIREWALLS
 Three common types of firewalls:
 Packet-filtering-router.
 Application-level-gateways.
 Circuit-level-gateways.
 Bastion host
TRUSTED SYSTEM
 A trusted system can protect malicious attacks
from future bugs or viruses.
 The code of a trusted system I passed through
rigorous analysis and development
 A trusted system and an untrusted system can
share a similar foundation
TRUSTED SYSTEM MODEL
vanmathy cryptography network security

More Related Content

PPSX
Intrusion detection system
DOCX
The way of network intrusion and their detection and prevention
PPT
Essentials Of Security
 
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
PDF
IDS (intrusion detection system)
PDF
IS - Firewall
Intrusion detection system
The way of network intrusion and their detection and prevention
Essentials Of Security
 
The Role of Intrusion Detection Systems in Network Security.pdf
The Role of Intrusion Detection Systems in Network Security.pdf
Enhanced method for intrusion detection over kdd cup 99 dataset
IDS (intrusion detection system)
IS - Firewall

Similar to vanmathy cryptography network security (20)

PPTX
Information Security.pptx
PDF
46 102-112
PDF
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
PDF
1776 1779
PDF
1776 1779
PPTX
Intrusion dDetection
PDF
Detection &Amp; Prevention Systems
PDF
Intrusion_Detection_By_loay_elbasyouni
PPTX
Ids vs ips
PDF
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
PDF
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
PPT
AN INTRUSION DETECTION SYSTEM
PPTX
Data security
PDF
International Journal of Engineering Research and Development (IJERD)
PPT
idps
PPTX
IDS VS IPS.pptx
PPT
PPT
IDS and IPS
DOC
06686259 20140405 205404
PDF
Module 19 (evading ids, firewalls and honeypots)
Information Security.pptx
46 102-112
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
1776 1779
1776 1779
Intrusion dDetection
Detection &Amp; Prevention Systems
Intrusion_Detection_By_loay_elbasyouni
Ids vs ips
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
AN INTRUSION DETECTION SYSTEM
Data security
International Journal of Engineering Research and Development (IJERD)
idps
IDS VS IPS.pptx
IDS and IPS
06686259 20140405 205404
Module 19 (evading ids, firewalls and honeypots)
Ad

More from PriyadharshiniVS (20)

PPTX
R Ramya devi digital image processing
PPTX
R ramya devi cloud computing
PPTX
Ramya devi R women empowerment
PPTX
R Ramya devi artificial intelligence and machine learning
PPTX
Ramya devi R internet of things
PPTX
PPTX
PPTX
PPTX
PPTX
MOBILE APP DEVELOPMENT USING PYTHON
PPTX
Vanmathy python
PPTX
PriyaDharshini distributed operating system
PPTX
Vanmathy distributed operating system
PPTX
vanmathy cryptography network security
PPTX
Vanmathy distributed operating system
PPTX
Vanmathy no sql
PPTX
Cryptography and network security
PPTX
PPTX
Graph, graph and network modeling, advantage of graph database
PPTX
Compiler design
R Ramya devi digital image processing
R ramya devi cloud computing
Ramya devi R women empowerment
R Ramya devi artificial intelligence and machine learning
Ramya devi R internet of things
MOBILE APP DEVELOPMENT USING PYTHON
Vanmathy python
PriyaDharshini distributed operating system
Vanmathy distributed operating system
vanmathy cryptography network security
Vanmathy distributed operating system
Vanmathy no sql
Cryptography and network security
Graph, graph and network modeling, advantage of graph database
Compiler design
Ad

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Cell Types and Its function , kingdom of life
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
master seminar digital applications in india
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Pharmacology of Heart Failure /Pharmacotherapy of CHF
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
VCE English Exam - Section C Student Revision Booklet
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Microbial disease of the cardiovascular and lymphatic systems
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
A systematic review of self-coping strategies used by university students to ...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Pharma ospi slides which help in ospi learning
Cell Types and Its function , kingdom of life
Final Presentation General Medicine 03-08-2024.pptx
master seminar digital applications in india
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

vanmathy cryptography network security

  • 1. NADAR SARASWATHI COLLEGE OF ARTS&SCIENCE,THENI DEPARTMENT OF COMPUTER SCIENCE&INFORMATION TECHNOLOGY V.VANMATHY I-MSC(CS)
  • 3. INTRUDERS  Any set of actions that attempt to compromise the confidentiality, integrity, or availability of a computer resource  One of the most publicized attack to security is the intruder, generally referred to a hacker or cracker. There classes of intruder are as follows:  Masquerader  Misfeasor  Clandestine user
  • 5. INTRUSION DELECTION SYSTEM(IDS) Intrusion detection I the process of identifying and responding to malicious activity targeted at resources IDS is a system designed to test/analyze network system traffic/events against a give set of parameters and alert/capture data when these IDS uses collected information and predefined knowledge-based System reason about the possibility of an intrusion. IDS also provides services to cop with intrusion such as giving alarms, activating programs to try to deal with intrusion,etc.
  • 6. FUNCTION OF IDS  An IDS detects attacks as soon as possible and takes appropriate action.  An ID dose not usually take preventive measures when an attack is detected  It is a reactive rather than a pro-active agent  It plays a role of informant rather than a police officer.
  • 7. PRINICIPLES OF INTRUCTION DETECTION SYSTEM  An IDS must run unattended for extended periods of time  The IDS must stay active and secure  The IDS must be also to recognize unusual activity  The IDS must operate without unduly affecting the system’s activity  The IDS must be configurable
  • 8. PRINCIPLES OF INTRUION DETECTION SYSTEMS
  • 9. COMPONENTS OF IDS  Basically there are three components or modules in an intrusion detection system:  Sensor: responsible for capturing packets and sending to the console class.  Console: responsible for analyzing packets captured by enor class.  Its is the class responsible for displaying GUI and generating alerts
  • 10. TYPES OF IDS  Network intrusion detection system(INDS)  Protocol based intrusion detection system(PIDS)  Application protocol based intrusion detection system(APIDS)  Host-based intrusion detection system(HIDS)
  • 11. VIRUSES AND RELATED THREATS  Perhaps the most sophisticated types of threats to computer systems are presented by program that exploit vulnerabilities in computing systems.  Malicious programs
  • 12. Viruses  Virus-vital information resources under seize  A virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive Virus phases: Dormant-waiting on trigger event Propagation –replicating to programs/disks Triggering-by event to execute payload Execution- of payload
  • 14. VIRUS COUNTERMEASURES Viral attacks exploit lack of integrity control on systems to defend need to add such controls Typically by one or more of:  Prevention-block virus infection mechanism  Detection-of viruses in infected system  Reaction – restoring system to clean state
  • 16. FIREWALL DESIGN PRINCIPLES  Information system undergo a steady evolution (from small LAN’s to internet connectivity).  Strong security features for all workstations and servers not established.  Effective means of protection a local system or network of system from network _ based security threats while affording access to the outside world via WAN’s or the internet.
  • 17. TYPES OF FIREWALLS  Three common types of firewalls:  Packet-filtering-router.  Application-level-gateways.  Circuit-level-gateways.  Bastion host
  • 18. TRUSTED SYSTEM  A trusted system can protect malicious attacks from future bugs or viruses.  The code of a trusted system I passed through rigorous analysis and development  A trusted system and an untrusted system can share a similar foundation