SELF MONITORING COMPUTER SYSTEM USING INTRUSION DETECTION
Keywords:
Intrusion Detection Systems, Cryptography, Logs, Digital ForensicAbstract
Now a days, there are new attacks are emerging everyday due to that the system makes the insecure even
the system wrapped with number of security measures. To find out the intrusion, IDS - an Intrusion Detection System
is used. To find out the intrusion and respond in timely manner is its prime function. In other words we can say, IDS
function is limited to detection as well as response. The system is not able to catch the state of the activity when an
attack is detected. Hence, in original form, it’s not possible to preserve the evidences against the attack. New security
strategy is needed to maintain the completeness and reliability of evidence for later examination. In our project work,
there proposed an automated Digital Forensic Technique with Intrusion Detection System. System will send an alert
message to capture the current state of the system, to admin or authorized User followed by invoke the digital forensic
tool Once an IDS detects an intrusion.