Site News

Science

A survey, shows that less then 40% of the British public feel they are well informed about science.

New Articles - Earth's Carbon Cycle Ultra Sonic Frogs Environmental Niche & Dinosaurs Seismic Waves Global Warming Life Support Systems Introduction to the Big Bang The Problem of Acid Rain

Our science section is in production with a proposed 1 Mar 07 "Grand launch" date.

Technology

The Linux Convert site explains how, even today, building your own linux box can be cheaper than getting an off the shelf Windows PC. There is a new article on why you should use linux there now.

New articles: Firewall Bypass Attack Snort For Newbies Malware and Intrusions Intrusion Detection Systems Malware, Trojans and Virus infections and Infection Removal

If you have any comments or suggestions for topics we should cover under the technology banner then please stop by the discussion board and let us know.

Intrusion Detection Systems

Conclusion

This project involved creating a protototype Network Intrusion System to analyse a sample network traffic output file.

The development of the IDS was successful, insofar as an operational lightweight IDS was developed. This could identify a range of suspicious activity from the record of network traffic and could be expanded on a modular basis to alert to a wide range of attacks.

Its main limitations are the limited number of attacks that it detects and the need to carry out initial doctoring of the text file input, as well as the standard limitations of a host-based IDS. That is, such an IDS cannot prevent an intrusion, It can only alert that an intrusion or intrusion attempt has taken place. However, the results can be used to influence network security policy.

The strengths of the program are in its simplicity and its idiot-proof nature. Once a text file is provided in the same folder, the process is automatic, the network admin need only run the executable file and a report is produced, indicating the numbers of potentially suspicious entries in the log. As with other host-based systems, the program does not impede the flow of network traffic, unlike a real-time IDS which may disrupt traffic on the basis of false-positive results.

Page 1 - Page 2 - Page 3 - Page 4

XHTML CSS level 2 W3 Sites Any Browser GEO Url

Sci-Tech

RSS Feed

News Provided By The BBC