Computer security is the process of preventing and detecting unauthorized use of our computer. Prevention measures help us to stop unauthorized users (also known as "intruders") from accessing any part of our computer system. Detection helps us to determine whether or not someone attempted to break into our system, if they were successful, and what they may have done.

In this paper, we proposed the technique called Deterrence technique which is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability or to bypass the security mechanisms of a computer or network. Deterrence system is also classified based on the types of systems they monitor. The two main systems monitored for intrusions are host-based systems and network based systems. Host-based IDPS attempt to detect against attacks on a particular machine. This is typically done through analysis of a computers log files. We typically monitor system, event, and security logs on Windows NT and syslog in UNIX environments. When any of these files change, the system compares the new log entry with attack signatures to see if there is a match. If so, the system responds with administrator alerts and other calls to action. Finally, some products listen to port activity and alert administrators when specific ports are accessed. Host-based system monitor user and file access activity, changes to file permissions, attempts to install new executables and/or attempts to access privileged services. This paper includes Password attack, Scanning attack, Sniffing attack and Spoofing attack. This paper is developed using C and Shell scripting in Linux environment.

Tags :
Your rating: None Average: 4.6 (5 votes)