Site News

Science

A survey, shows that less then 40% of the British public feel they are well informed about science.

New Articles - Earth's Carbon Cycle Ultra Sonic Frogs Environmental Niche & Dinosaurs Seismic Waves Global Warming Life Support Systems Introduction to the Big Bang The Problem of Acid Rain

Our science section is in production with a proposed 1 Mar 07 "Grand launch" date.

Technology

The Linux Convert site explains how, even today, building your own linux box can be cheaper than getting an off the shelf Windows PC. There is a new article on why you should use linux there now.

New articles: Firewall Bypass Attack Snort For Newbies Malware and Intrusions Intrusion Detection Systems Malware, Trojans and Virus infections and Infection Removal

If you have any comments or suggestions for topics we should cover under the technology banner then please stop by the discussion board and let us know.

Intrusion Detection Systems

Specific requirements of this IDS

Software can provide regular (daily) intrusion detection reports that summarize the results of traffic captured and analyze the traffic for evidence of intrusion. Regular examination can allow administrators to identify if there was an intrusion, which system was the target, and what services were affected.

The envisioned Intrusion Detection System that will be developed in this report will belong to the group of Log file Analysers and will report on anomalies, specifically looking for the forms of anomalous behaviour associated with common forms of attack, such as SYN flooding IP spoofing or masquerading, denial of service attacks and virus related anomalies.

The objective is to identify evidence of potential attacks from a sample traffic file and create a concise report that identifies the anomalous traffic to the user. A secondary aim is to provide a basic security policy on which the users can base further security procedures.

This approach to intrusion detection has some disadvantages that include the fact that they only analyse activity after it has taken place. So this type of IDS cannot prevent an attack or detect it at the instant that it is happening. However, it can flag up anomalous network behaviour so that system administrators can take action in the future and can analyse the signatures or sources of attack in order to create better holistic security policies.

Page 1 - Page 2 - Page 3 - Page 4 - Page 5 - Page 6 - Page 7

XHTML CSS level 2 W3 Sites Any Browser GEO Url

Sci-Tech

RSS Feed

News Provided By The BBC