SlideShare a Scribd company logo
Presentation On
Intruders Detection
Intruders Detection


   Intruder detection is the art of detecting intruders
behind attacks as unique persons. This technique tries to
 identify the person behind an attack by analyzing their
                 computational behavior
Need Of Intruder Detection


Determining whether an intruder has
gain or has attempted to gain
unauthorized access to the system

Two groups of intruders:
  External
  Internal
Some Techniques


    Keystrokes Dynamics
    Command Used
    Command Sequence
    IP Address Used
    ISP
    Country, City
    Ports Used
Keystrokes Dynamics


Keystroke Dynamics is paramount in Intruder Detection
techniques because it is the only parameter that has been
classified as a real 'behavioural biometric pattern'.

Keystroke dynamics analyze times between keystrokes
issued in a computer keyboard or cellular phone keypad
searching for patterns. First techniques used statistics and
probability concepts like 'standard deviations' and
'Mean', later approaches use data mining, neural
networks, Support Vector Machine, etc.
Intruder Detection System


 First became needed in late 70s
 Originally used with single systems
 OS produced audit records that were
  process by the IDS
 IDS has expanded to distributed
  systems and networks
Intruder Prevention



  Requiring passwords to be submitted

       Thanks
   before users can access the system
  Fixing     or
   vulnerabilities
                     patching      known

  Blocking network access
  Restricting physical access

More Related Content

What's hot

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
Umesh Dhital
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
Apoorv Pandey
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
vamsi_xmen
 

What's hot (17)

Data Mining and Intrusion Detection
Data Mining and Intrusion Detection Data Mining and Intrusion Detection
Data Mining and Intrusion Detection
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Security
Security Security
Security
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Ids(final)
Ids(final)Ids(final)
Ids(final)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 

Similar to Intruders detection

Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
Loay Elbasyouni
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
Seraphic Nazir
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
A review of anomaly based intrusions detection in
A review of anomaly based intrusions detection inA review of anomaly based intrusions detection in
A review of anomaly based intrusions detection in
IAEME Publication
 
A review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applicationsA review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applications
iaemedu
 
A review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applicationsA review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applications
IAEME Publication
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
ijcsbi
 

Similar to Intruders detection (20)

Network and web security
Network and web securityNetwork and web security
Network and web security
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Autonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer NetworksAutonomic Anomaly Detection System in Computer Networks
Autonomic Anomaly Detection System in Computer Networks
 
Intrusion detection systems
Intrusion detection systemsIntrusion detection systems
Intrusion detection systems
 
Self Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized ActivitySelf Monitoring System to Catch Unauthorized Activity
Self Monitoring System to Catch Unauthorized Activity
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A review of anomaly based intrusions detection in
A review of anomaly based intrusions detection inA review of anomaly based intrusions detection in
A review of anomaly based intrusions detection in
 
A review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applicationsA review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applications
 
A review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applicationsA review of anomaly based intrusions detection in multi tier web applications
A review of anomaly based intrusions detection in multi tier web applications
 
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection SystemsDetecting and Preventing Attacks Using Network Intrusion Detection Systems
Detecting and Preventing Attacks Using Network Intrusion Detection Systems
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 

More from Ehtisham Ali

Vintage indian advertisement's
Vintage indian advertisement'sVintage indian advertisement's
Vintage indian advertisement's
Ehtisham Ali
 
Extreme Interview Questions
Extreme Interview QuestionsExtreme Interview Questions
Extreme Interview Questions
Ehtisham Ali
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
Ehtisham Ali
 

More from Ehtisham Ali (20)

Vintage indian advertisement's
Vintage indian advertisement'sVintage indian advertisement's
Vintage indian advertisement's
 
Extreme Interview Questions
Extreme Interview QuestionsExtreme Interview Questions
Extreme Interview Questions
 
Windows Avtars
Windows AvtarsWindows Avtars
Windows Avtars
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Asymptotic notations
Asymptotic notationsAsymptotic notations
Asymptotic notations
 
Huffman Coding
Huffman CodingHuffman Coding
Huffman Coding
 
Windows basic quiz
Windows basic quizWindows basic quiz
Windows basic quiz
 
Wallpapers show
Wallpapers showWallpapers show
Wallpapers show
 
Wi fi Technology
Wi fi TechnologyWi fi Technology
Wi fi Technology
 
Virtual vista
Virtual vistaVirtual vista
Virtual vista
 
Marketing segmentations
Marketing segmentationsMarketing segmentations
Marketing segmentations
 
Lcd technology
Lcd technologyLcd technology
Lcd technology
 
Gd topics list
Gd topics listGd topics list
Gd topics list
 
Dvd
DvdDvd
Dvd
 
My room
My roomMy room
My room
 
Filmi kids
Filmi kidsFilmi kids
Filmi kids
 
Excel tutorial on students record
Excel tutorial on students record Excel tutorial on students record
Excel tutorial on students record
 
Television broadcasting and promotion
Television broadcasting and promotionTelevision broadcasting and promotion
Television broadcasting and promotion
 
TechQuiz
TechQuizTechQuiz
TechQuiz
 
Ms dos tutorial
Ms dos tutorialMs dos tutorial
Ms dos tutorial
 

Recently uploaded

Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
Avinash Rai
 

Recently uploaded (20)

The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 

Intruders detection

  • 2. Intruders Detection Intruder detection is the art of detecting intruders behind attacks as unique persons. This technique tries to identify the person behind an attack by analyzing their computational behavior
  • 3. Need Of Intruder Detection Determining whether an intruder has gain or has attempted to gain unauthorized access to the system Two groups of intruders: External Internal
  • 4. Some Techniques  Keystrokes Dynamics  Command Used  Command Sequence  IP Address Used  ISP  Country, City  Ports Used
  • 5. Keystrokes Dynamics Keystroke Dynamics is paramount in Intruder Detection techniques because it is the only parameter that has been classified as a real 'behavioural biometric pattern'. Keystroke dynamics analyze times between keystrokes issued in a computer keyboard or cellular phone keypad searching for patterns. First techniques used statistics and probability concepts like 'standard deviations' and 'Mean', later approaches use data mining, neural networks, Support Vector Machine, etc.
  • 6. Intruder Detection System  First became needed in late 70s  Originally used with single systems  OS produced audit records that were process by the IDS  IDS has expanded to distributed systems and networks
  • 7. Intruder Prevention  Requiring passwords to be submitted Thanks before users can access the system  Fixing or vulnerabilities patching known  Blocking network access  Restricting physical access