The attacks on computer networks are not a new deal. In general except for financial institutions and military or intelligence organizations nobody bothers about it. But in recent times it is being observing that it effects much more than the said calculations. Assuming that somebody (attacker) blocked the access of particular seller's website at peak times then it results that his customer would like to choose another seller's website whose outcome may result to tremendous loss of permanent seller. Likewise, there are many instances where the impact on network attacks has been observed from top notch to common people. Snort has emerged as a powerful solution to those organizations that could not spent much on purchasing licensed intrusion detection and prevention system as snort is free ware. This paper is aiding to popularize the techniques that can help everybody to identify and prevent from these attacks. The discussed medium in this paper is SNORT, an open source and powerful network intrusion detection and prevention tool.
Cyber Laws are the laws prevailing in the cyber space. Cyber space has a vast definition which encompasses the term like computers, computer networks, software, data storage devices, the Internet, websites, emails and even electronic devices such as cell phones, ATM machines, satellites, Microwaves etc. These Laws covers firstly that they must be standardized by government. Secondly should be in force under some specific region and finally must be obeyed by all persons under such specified region. Any violation of these rules could give the right to government to take action such as imprisonment, or fine or an order to pay compensation as per specified through proper Legal jurisdiction. In India, in general the major concerned on Cyber Laws is on Cyber Crimes, Electronic and Digital Signatures, Intellectual Property, Data Protection and Privacy. It should be noted all that cyber crimes are unlawful in which computer or any resource attached to it, is tampered. Here devices of both attacker and victim are important evidences also. At last the term crime and the punishment to criminal in such offence can vary from country to country. It is so because the Constitution of any country is a law of land where land is the territory of that country.
A Ne t wo rk I n tru s io n D et ect io n P r eve n tio n S ys te m (I DPS) i s a me ch a n i sm th a t co n tin u o u s ly mo n ito r s t h e n et wo rk t ra f fi c a n d fin d s o u t th e ma li cio u s, su sp ici o u s a n d u n d es ir ed n e t wo rk a ct iv iti e s. A ft er id en t if yin g a n y i ll eg i ti ma te a c tiv it y i t si mp l y b lo ck s it a n d ch a n g es th e secu r it y en vi ro n m en t a s p er th e ru le s set b y p o l ic y ma ker (s). It sh o u ld b e n o ted th a t th i s ta s k o f mo n ito rin g i s a cco mp l ish ed in rea l-t im e mo d e so th a t t h e o n ly g en u in e n e t wo r k t ra f fic is a l lo wed to p a ss th ro u g h th e IPS wi th o u t n o ticea b le d e la y. Ad d it io n a l ly, so me o rg a n iza tio n s emp lo y ma n y o th e r t ech n o lo g ie s o n t h e p la c e o f ID PS s th a t p re sen t th e sa me a b ili ty a s I DPS s d o e s a n d a lso ma t ch wi th th e co mp eten ci es o f IDPS s. In th i s p a p e r, we w il l fo cu s o n so me o f th e se ma t ch in g tec h n o lo g ie s: n et wo rk fo r en s ic a n a ly s is to o l s, a n ti-ma l wa re te ch n o lo g i es (a n t ivi ru s so ft wa re) a n d fi r ewa ll s a n d ro u t er s. Ea ch o f th e se t ech n o lo g ie s a re n o w b r i efl y exp la in ed g i vin g th e i n fo rma tio n h o w it s u s e h elp in d ete ct in g in t ru sio n a n d i t s a vo id a n ce s ta tin g re la tio n sh ip o f th e se tech n o lo g ie s wi th I D PS s. S u g g es tio n wi ll b e a d d ed to a p p ro p ria tio n tel li n g h o w w e sh o u ld u se th e se tech n o lo g i e s a lo n g wi th I D PS s .
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.