|Project Description: ||Rapid technological advances in the application of data processing operations and maintenance permeate all facets of business and, therefore, have led to an increase in the development of strategic ways to mount malicious attacks on both public and personal computer networks/systems. Modern techniques and methodologies for detecting malevolent activities and attacks on computer systems and networks have evolved quickly in recent years. Intrusion Detection System (IDS) have become a critical means to ensure the security of administrated computer networks. IDSís seek to detect intrusions before systems can be affected by malicious actions. They accomplish this by logging the attempts made by an intruder to accumulate intelligence regarding a targeted system. While IDS tools have become prevalent in todayís market, they are still not completely foolproof and can fail to identify serious malicious attacks.
The intention of this project was to investigate selected existing network intrusion detection tools and techniques, and to review the strategies, which they employ. The selected freeware tools, Snort and Sax2 were tested to analyze their behavior when confronted with particular well-known network attacks.