TECHNICAL PAPERS

Intrusion Detection System

                      Intrusion Detection System (IDS) attempt to identify Computer system intrusion and misuse by gathering and analyzing data. IDSs have traditionally been developed to detect intrusion and misuse for wired system and networks. More recently, IDSs have been developed for use on wireless networks. These wireless IDSs can monitor and analyze user and system activities of known attacks, identify abnormal network activity and detect policy violations. Wireless IDSs gather all local wireless transmissions and generate alerts based either on predefined signatures or on anomalies in the traffic.

A wireless Intrusion Detection System is similar to a standard, wired IDS, but has additional deployment requirements, as well as some unique features, specify to intrusion and misuse detection. An Intrusion Detection System is used to detect several types of malicious behavior that can compromise the security and trust of the computer system. We intend to avoid the access and keep track of the intruder’s attempts and intrusions.

A wireless Intrusion Detection and Avoidance System (IDAS) is software designed to detect unwanted attempt and accessing, manipulating and/or disabling computer system using cell phone. We intend to avoid the access and keep track of the intruders attempts and intentions.

Advantages and Disadvantages

Advantages

  1. All other applications run in the background which is not possible in any mode of PC i.e. standby, sleep, and log off modes.
  2. The intruder image can be viewed by the admin anytime.
  3. The number of packets transferred or received using the internet can be tracked.
  4. The application is having settings option which the admin can change anytime. e.g. changing the password, record option, taking image etc.

Disadvantages

  1. Must have the dial-up connection with PC and GPRS activated on mobile.
  2. If the PC has restarted the application has to be started again by the admin.

Conclusion

Intrusion detection system can be used for monitoring file system for changes. It is helpful in detecting what changes are made to the system after an attack. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. We intend to avoid the access and keep track of the intruder’s attempts and intentions. Such a system can make a big addition to the security in today’s world to avoid different kinds of attacks (CryptoLockerWannaCry, other Ransomware attacks happening around.

Ravi Bandakkanavar

A Techie, Blogger, Web Designer, Programmer by passion who aspires to learn new Technologies every day. A founder of Krazytech. It's been 10+ years since I am publishing articles and enjoying every bit of it. I want to share the knowledge and build a great community with people like you.

Leave a Comment

View Comments

Share
Published by
Ravi Bandakkanavar

Recent Posts

Everything You Need To Know About Create React App

The configuration of resources can be a time-consuming and difficult operation while creating a React…

3 weeks ago

Causes of CyberCrime and Preventive Measures

          Rapid technological growth and developments have provided vast areas of…

1 month ago

How Data Lineage will Improve Business Practices

How often have you thought about changing the way that you store and use data?…

1 month ago

10 Dominating Programming Language for Mobile App In 2022

Programming Languages are a set of rules that aid in transforming a concept into a…

1 month ago

What is Serverless Edge Computing? Features | Benefits

Serverless edge computing is a new technology with a lot of promise, but it can…

1 month ago

Are Your Accounts Protected Against Cyberattacks?

Do any of your passwords include personal names, date of birth, or pet names? If…

2 months ago