Intrusion Detection System: Submitted by Branch: Regn. No.
Intrusion Detection System: Submitted by Branch: Regn. No.
DETECTION
SYSTEM
SUBMITTED BY
SHRABANTEE KSHYATRIBAR SINGH
BRANCH : CSE
REGN. NO. : 0801288096
AGENDA
1. Introduction
2. Definition of IDS
3. What does IDS do ?
4. What is the difference between IDS and firewall ?
5. Types of IDS
× NIDS
× HIDS
By utilizing these systems, attacks can not only be detected, they can also be
properly investigated by identifying attack trends and patterns.
The IDS systems that allow us to accomplish these goals must also be protected
against attacks as well, to prevent the corruption of attack data.
It is only through identifying attack trends and patterns, and keeping logs un-
corrupted that insider attacks can be thwarted from the IDS part of the security
spectrum.
Thank You !!
ANY QUERIES ??