An Evaluation of current IDS
Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
With the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.
Place, publisher, year, edition, pages
Institutionen för systemteknik , 2008. , 100 p.
IDS, NIDS, HIDS, Snort, False Positive, Firewall
Computer and Information Science
IdentifiersURN: urn:nbn:se:liu:diva-11635ISRN: LiTH-ISY-EX--08/4160--SEOAI: oai:DiVA.org:liu-11635DiVA: diva2:18049
2008-02-07, Systemet, A, Linköping University, Linköping, 10:15 (English)