Intruders detection

790
-1

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
790
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Intruders detection

  1. 1. Presentation OnIntruders Detection
  2. 2. Intruders Detection Intruder detection is the art of detecting intrudersbehind attacks as unique persons. This technique tries to identify the person behind an attack by analyzing their computational behavior
  3. 3. Need Of Intruder DetectionDetermining whether an intruder hasgain or has attempted to gainunauthorized access to the systemTwo groups of intruders: External Internal
  4. 4. Some Techniques  Keystrokes Dynamics  Command Used  Command Sequence  IP Address Used  ISP  Country, City  Ports Used
  5. 5. Keystrokes DynamicsKeystroke Dynamics is paramount in Intruder Detectiontechniques because it is the only parameter that has beenclassified as a real behavioural biometric pattern.Keystroke dynamics analyze times between keystrokesissued in a computer keyboard or cellular phone keypadsearching for patterns. First techniques used statistics andprobability concepts like standard deviations andMean, later approaches use data mining, neuralnetworks, Support Vector Machine, etc.
  6. 6. Intruder Detection System First became needed in late 70s Originally used with single systems OS produced audit records that were process by the IDS IDS has expanded to distributed systems and networks
  7. 7. Intruder Prevention  Requiring passwords to be submitted Thanks before users can access the system  Fixing or vulnerabilities patching known  Blocking network access  Restricting physical access

×