|Project Description: ||Change monitoring is the definitive way of detecting intrusion. This intrusion detection system monitors a repository of data for change. The repository could be anything from files to file systems or hosts to network devices. Each repository is fingerprinted using MD5. To verify integrity, the repository is fingerprinted andain and compared with the stored fingerprints. If both fingerprints do not match, unauthorized changes have been made.