SELF MONITORING COMPUTER SYSTEM USING INTRUSION DETECTION

Authors

  • Ms. Rupali V. Gurav -
  • Ms. Rafat R. Bagwan -
  • Ms. Snehal V. Bhosale -
  • Ms. Girija V. Dixit -
  • Ms. Aarti U. Godase -
  • Prof. S.A. Shegdar -

Keywords:

Intrusion Detection Systems, Cryptography, Logs, Digital Forensic

Abstract

Now a days, there are new attacks are emerging everyday due to that the system makes the insecure even
the system wrapped with number of security measures. To find out the intrusion, IDS - an Intrusion Detection System
is used. To find out the intrusion and respond in timely manner is its prime function. In other words we can say, IDS
function is limited to detection as well as response. The system is not able to catch the state of the activity when an
attack is detected. Hence, in original form, it’s not possible to preserve the evidences against the attack. New security
strategy is needed to maintain the completeness and reliability of evidence for later examination. In our project work,
there proposed an automated Digital Forensic Technique with Intrusion Detection System. System will send an alert
message to capture the current state of the system, to admin or authorized User followed by invoke the digital forensic
tool Once an IDS detects an intrusion.

Published

2020-03-25

How to Cite

Ms. Rupali V. Gurav, Ms. Rafat R. Bagwan, Ms. Snehal V. Bhosale, Ms. Girija V. Dixit, Ms. Aarti U. Godase, & Prof. S.A. Shegdar. (2020). SELF MONITORING COMPUTER SYSTEM USING INTRUSION DETECTION. International Journal of Advance Research in Engineering, Science & Technology, 7(3), 16–19. Retrieved from https://ijarest.org/index.php/ijarest/article/view/1978