Documente Academic
Documente Profesional
Documente Cultură
Presented by
SHIVAM PANDEY
Contents
Introduction
Security Goals
Layering Based Security Approach
Types of Attacks
Intrusion detection systems
Components of IDS
IDS Detection Methodologies
Conclusion
Refferences
Introduction
Confidentiality
Data integrity
Service availability
Non-repudiation
Layering Based Security Approach
Application Layer
-Manages data connection.
Transport Layer
-connection establishment.
Network Layer
-routing of cluster.
Data link layer
-multiplexing of data stream,error detection, encryption, mac.
Physical Layer
-signal detection, strength, frequency selection, generation.
Types of attacks
Passive attacks
Active attacks
Types of attacks
Intrusion detection systems
Monitoring component
-Traffic pattern ,internal events ,resource utilization
Analysis & detection module
-Network operation analysis & detection
Alarm component
-Generates Alarm
Components Of IDS
IDS detection methodologies