DATA-STREAM BASED INTRUSION DETECTION SYSTEM BY USING DATA MINING AND FORENSIC TECHNIQUES

Authors

  • Miss. Pranjali Yadav Deshmukh Department of Information Technology Dr. D. Y. Patil Polytechnic, Akurdi
  • Pooja Bhosle Department of Information Technology Dr. D. Y. Patil Polytechnic, Akurdi
  • Rutuja Jadhav Department of Information Technology Dr. D. Y. Patil Polytechnic, Akurdi
  • pallavi Danawale Department of Information Technology Dr. D. Y. Patil Polytechnic, Akurdi
  • Snehal jadhav Department of Information Technology Dr. D. Y. Patil Polytechnic, Akurdi

Keywords:

Intrusion Detection Systems, Digital Forensic, Logs, Cryptography

Abstract

In today’s technology, there are new attacks are emerging everyday due to that the system makes the
Insecure even the system wrapped with number of security measures. To detect the intrusion, an Intrusion Detection
System (IDS) is used. To detect the intrusion and respond in timely manner is its prime function. In other words, IDS
Function is limited to detection as well as response. The IDS is unable to capture the state of the system when an
intrusion is detected. So that, in original form, it fails to preserve the evidences against the attack. New security strategy
Is very much needed to maintain the completeness and reliability of evidence for later examination. In this research
Work, there proposed an automated Digital Forensic Technique with Intrusion Detection System. It sends an alert
Message to capture the state of the system, to administrator followed by invoke the digital forensic tool Once an IDS
detects an intrusion. To prove the damage Captured image can be used as evidence in the court of law.

Published

2018-03-25

How to Cite

Miss. Pranjali Yadav Deshmukh, Pooja Bhosle, Rutuja Jadhav, pallavi Danawale, & Snehal jadhav. (2018). DATA-STREAM BASED INTRUSION DETECTION SYSTEM BY USING DATA MINING AND FORENSIC TECHNIQUES. International Journal of Advance Engineering and Research Development (IJAERD), 5(3), 1039–1044. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/2818

Most read articles by the same author(s)