Your SlideShare is downloading. ×
Presentation OnIntruders Detection
Intruders Detection   Intruder detection is the art of detecting intrudersbehind attacks as unique persons. This technique...
Need Of Intruder DetectionDetermining whether an intruder hasgain or has attempted to gainunauthorized access to the syste...
Some Techniques    Keystrokes Dynamics    Command Used    Command Sequence    IP Address Used    ISP    Country, Cit...
Keystrokes DynamicsKeystroke Dynamics is paramount in Intruder Detectiontechniques because it is the only parameter that h...
Intruder Detection System First became needed in late 70s Originally used with single systems OS produced audit records...
Intruder Prevention  Requiring passwords to be submitted       Thanks   before users can access the system  Fixing     o...
Upcoming SlideShare
Loading in...5
×

Intruders detection

721

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
721
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Intruders detection"

  1. 1. Presentation OnIntruders Detection
  2. 2. Intruders Detection Intruder detection is the art of detecting intrudersbehind attacks as unique persons. This technique tries to identify the person behind an attack by analyzing their computational behavior
  3. 3. Need Of Intruder DetectionDetermining whether an intruder hasgain or has attempted to gainunauthorized access to the systemTwo groups of intruders: External Internal
  4. 4. Some Techniques  Keystrokes Dynamics  Command Used  Command Sequence  IP Address Used  ISP  Country, City  Ports Used
  5. 5. Keystrokes DynamicsKeystroke Dynamics is paramount in Intruder Detectiontechniques because it is the only parameter that has beenclassified as a real behavioural biometric pattern.Keystroke dynamics analyze times between keystrokesissued in a computer keyboard or cellular phone keypadsearching for patterns. First techniques used statistics andprobability concepts like standard deviations andMean, later approaches use data mining, neuralnetworks, Support Vector Machine, etc.
  6. 6. Intruder Detection System First became needed in late 70s Originally used with single systems OS produced audit records that were process by the IDS IDS has expanded to distributed systems and networks
  7. 7. Intruder Prevention  Requiring passwords to be submitted Thanks before users can access the system  Fixing or vulnerabilities patching known  Blocking network access  Restricting physical access

×