SlideShare a Scribd company logo
1 of 20
NADAR SARASWATHI COLLEGE OF ARTS&SCIENCE,THENI
DEPARTMENT OF COMPUTER SCIENCE&INFORMATION
TECHNOLOGY
V.VANMATHY
I-MSC(CS)
topic: intruder
INTRUDERS
 Any set of actions that attempt to compromise
the confidentiality, integrity, or availability of a
computer resource
 One of the most publicized attack to security is
the intruder, generally referred to a hacker or
cracker.
There classes of intruder are as follows:
 Masquerader
 Misfeasor
 Clandestine user
INTRUSION DETECTION
SYSTEM (IDS)
INTRUSION DELECTION
SYSTEM(IDS)
Intrusion detection I the process of identifying and
responding to malicious activity targeted at
resources
IDS is a system designed to test/analyze network
system traffic/events against a give set of
parameters and alert/capture data when these
IDS uses collected information and predefined
knowledge-based System reason about the
possibility of an intrusion.
IDS also provides services to cop with intrusion
such as giving alarms, activating programs to try
to deal with intrusion,etc.
FUNCTION OF IDS
 An IDS detects attacks as soon as possible and
takes appropriate action.
 An ID dose not usually take preventive measures
when an attack is detected
 It is a reactive rather than a pro-active agent
 It plays a role of informant rather than a police
officer.
PRINICIPLES OF INTRUCTION DETECTION
SYSTEM
 An IDS must run unattended for extended periods
of time
 The IDS must stay active and secure
 The IDS must be also to recognize unusual
activity
 The IDS must operate without unduly affecting
the system’s activity
 The IDS must be configurable
PRINCIPLES OF INTRUION DETECTION
SYSTEMS
COMPONENTS OF IDS
 Basically there are three components or modules
in an intrusion detection system:
 Sensor: responsible for capturing packets and
sending to the console class.
 Console: responsible for analyzing packets
captured by enor class.
 Its is the class responsible for displaying GUI and
generating alerts
TYPES OF IDS
 Network intrusion detection system(INDS)
 Protocol based intrusion detection system(PIDS)
 Application protocol based intrusion detection
system(APIDS)
 Host-based intrusion detection system(HIDS)
VIRUSES AND RELATED
THREATS
 Perhaps the most sophisticated types of threats
to computer systems are presented by program
that exploit vulnerabilities in computing systems.
 Malicious programs
Viruses
 Virus-vital information resources under seize
 A virus is a malware program that, when
executed, replicates by inserting copies of itself
into other computer programs, data files, or the
boot sector of the hard drive
Virus phases:
Dormant-waiting on trigger event
Propagation –replicating to programs/disks
Triggering-by event to execute payload
Execution- of payload
TYPES OF VIRUSES
VIRUS
COUNTERMEASURES
Viral attacks exploit lack of integrity control on
systems to defend need to add such controls
Typically by one or more of:
 Prevention-block virus infection mechanism
 Detection-of viruses in infected system
 Reaction – restoring system to clean state
VIRUS REMOVAL TECHIQUE
FIREWALL DESIGN
PRINCIPLES
 Information system undergo a steady evolution
(from small LAN’s to internet connectivity).
 Strong security features for all workstations and
servers not established.
 Effective means of protection a local system or
network of system from network _ based security
threats while affording access to the outside world
via WAN’s or the internet.
TYPES OF FIREWALLS
 Three common types of firewalls:
 Packet-filtering-router.
 Application-level-gateways.
 Circuit-level-gateways.
 Bastion host
TRUSTED SYSTEM
 A trusted system can protect malicious attacks
from future bugs or viruses.
 The code of a trusted system I passed through
rigorous analysis and development
 A trusted system and an untrusted system can
share a similar foundation
TRUSTED SYSTEM MODEL
vanmathy cryptography network security

More Related Content

Similar to vanmathy cryptography network security

Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
Alison Hall
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Intrusion Detection System Essay
Intrusion Detection System EssayIntrusion Detection System Essay
Intrusion Detection System Essay
Candice Him
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
elihuwalker
 

Similar to vanmathy cryptography network security (20)

Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Data security
Data securityData security
Data security
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
idps
idpsidps
idps
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Ids
IdsIds
Ids
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
information security technology
information security technologyinformation security technology
information security technology
 
Intrusion Detection System Essay
Intrusion Detection System EssayIntrusion Detection System Essay
Intrusion Detection System Essay
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 

More from PriyadharshiniVS

More from PriyadharshiniVS (20)

R Ramya devi digital image processing
R  Ramya devi digital image processingR  Ramya devi digital image processing
R Ramya devi digital image processing
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Ramya devi R women empowerment
Ramya devi R women empowermentRamya devi R women empowerment
Ramya devi R women empowerment
 
R Ramya devi artificial intelligence and machine learning
R Ramya devi  artificial intelligence and machine learningR Ramya devi  artificial intelligence and machine learning
R Ramya devi artificial intelligence and machine learning
 
Ramya devi R internet of things
Ramya devi R internet of thingsRamya devi R internet of things
Ramya devi R internet of things
 
vs.pptx
vs.pptxvs.pptx
vs.pptx
 
WE.pptx
WE.pptxWE.pptx
WE.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 
MOBILE APP DEVELOPMENT USING PYTHON
MOBILE APP DEVELOPMENT USING PYTHONMOBILE APP DEVELOPMENT USING PYTHON
MOBILE APP DEVELOPMENT USING PYTHON
 
Vanmathy python
Vanmathy python Vanmathy python
Vanmathy python
 
PriyaDharshini distributed operating system
PriyaDharshini distributed operating systemPriyaDharshini distributed operating system
PriyaDharshini distributed operating system
 
Vanmathy distributed operating system
Vanmathy distributed operating system Vanmathy distributed operating system
Vanmathy distributed operating system
 
vanmathy cryptography network security
vanmathy cryptography network securityvanmathy cryptography network security
vanmathy cryptography network security
 
Vanmathy distributed operating system
Vanmathy distributed operating system Vanmathy distributed operating system
Vanmathy distributed operating system
 
Vanmathy no sql
Vanmathy no sql Vanmathy no sql
Vanmathy no sql
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
No sql
No sql No sql
No sql
 
Graph, graph and network modeling, advantage of graph database
Graph, graph and network modeling, advantage of graph databaseGraph, graph and network modeling, advantage of graph database
Graph, graph and network modeling, advantage of graph database
 
Compiler design
Compiler designCompiler design
Compiler design
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

vanmathy cryptography network security

  • 1. NADAR SARASWATHI COLLEGE OF ARTS&SCIENCE,THENI DEPARTMENT OF COMPUTER SCIENCE&INFORMATION TECHNOLOGY V.VANMATHY I-MSC(CS)
  • 3. INTRUDERS  Any set of actions that attempt to compromise the confidentiality, integrity, or availability of a computer resource  One of the most publicized attack to security is the intruder, generally referred to a hacker or cracker. There classes of intruder are as follows:  Masquerader  Misfeasor  Clandestine user
  • 5. INTRUSION DELECTION SYSTEM(IDS) Intrusion detection I the process of identifying and responding to malicious activity targeted at resources IDS is a system designed to test/analyze network system traffic/events against a give set of parameters and alert/capture data when these IDS uses collected information and predefined knowledge-based System reason about the possibility of an intrusion. IDS also provides services to cop with intrusion such as giving alarms, activating programs to try to deal with intrusion,etc.
  • 6. FUNCTION OF IDS  An IDS detects attacks as soon as possible and takes appropriate action.  An ID dose not usually take preventive measures when an attack is detected  It is a reactive rather than a pro-active agent  It plays a role of informant rather than a police officer.
  • 7. PRINICIPLES OF INTRUCTION DETECTION SYSTEM  An IDS must run unattended for extended periods of time  The IDS must stay active and secure  The IDS must be also to recognize unusual activity  The IDS must operate without unduly affecting the system’s activity  The IDS must be configurable
  • 8. PRINCIPLES OF INTRUION DETECTION SYSTEMS
  • 9. COMPONENTS OF IDS  Basically there are three components or modules in an intrusion detection system:  Sensor: responsible for capturing packets and sending to the console class.  Console: responsible for analyzing packets captured by enor class.  Its is the class responsible for displaying GUI and generating alerts
  • 10. TYPES OF IDS  Network intrusion detection system(INDS)  Protocol based intrusion detection system(PIDS)  Application protocol based intrusion detection system(APIDS)  Host-based intrusion detection system(HIDS)
  • 11. VIRUSES AND RELATED THREATS  Perhaps the most sophisticated types of threats to computer systems are presented by program that exploit vulnerabilities in computing systems.  Malicious programs
  • 12. Viruses  Virus-vital information resources under seize  A virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive Virus phases: Dormant-waiting on trigger event Propagation –replicating to programs/disks Triggering-by event to execute payload Execution- of payload
  • 14. VIRUS COUNTERMEASURES Viral attacks exploit lack of integrity control on systems to defend need to add such controls Typically by one or more of:  Prevention-block virus infection mechanism  Detection-of viruses in infected system  Reaction – restoring system to clean state
  • 16. FIREWALL DESIGN PRINCIPLES  Information system undergo a steady evolution (from small LAN’s to internet connectivity).  Strong security features for all workstations and servers not established.  Effective means of protection a local system or network of system from network _ based security threats while affording access to the outside world via WAN’s or the internet.
  • 17. TYPES OF FIREWALLS  Three common types of firewalls:  Packet-filtering-router.  Application-level-gateways.  Circuit-level-gateways.  Bastion host
  • 18. TRUSTED SYSTEM  A trusted system can protect malicious attacks from future bugs or viruses.  The code of a trusted system I passed through rigorous analysis and development  A trusted system and an untrusted system can share a similar foundation