Literature Review On Intrusion System

1398 Words6 Pages

KWAME NKRUMAH UNIVERSITY OF SCIENCE AND TECHNOLOGY SCHOOL OF GRADUATE STUDIES INFORMATION TECHNOLOGY DEPARTMENT TOPIC: INTRUSION DETECTION SYSTEMS ERIC OSEI ANNOR: PG20706824 DR. YAW MISSAH December 2014 TABLE OF CONTENTS Chapter 1 Introduction Chapter 1.0 Introduction Chapter 1.1 Project Overview Chapter 1.2 Background Information Chapter 1.3 Statement of Problem Chapter 1.4 Purpose of Study Chapter 2 Literature Review Channel 2.0 Introduction Chapter 2.1 Classes of Intruders 1.0 INTRODUCTION OF THE PROBLEM Companies all over the world have pumped monies into their businesses and are looking forward making enormous profit. There is a very big challenge that these businesses and companies face. It is even more challenging …show more content…

2.1 Classes of Intruders The 3 classes of intruders are:  Masquerader Back in the days during festive seasons, people put in clothes and disguise themselves in a way that they conceal their true identity. A masquerader is anyone who gains legitimate access to a system and uses that to his or her full benefit. Most times these people are outside users and can be workers in that department and do not have authorized access to the system but someway somehow.  Misfeasor Every system administrator creates users on a system and grants them user access. This spells out the length at which all users can go. A misfeasor is a user of a system who has legitimate access to a system, but abuses the privileges given to him or her. He or she snoops around sensitive and vital areas.  Clandestine User Any user of a system has been given user authorization to use a system. A Clandestine user takes administrative role over a system and gains control and can hides and evades from …show more content…

The real deal here is the system that has been created in order to monitor all activities On the other hand; the honey pot is secluded from the rest of the machines and serves as decoy to these attacks and to make them think they have actually gained access into a system and monitors all activity. Honeypots can be grouped into two: production and research. These Honeypots can then be further classified into three main categories: low-interaction, high-interaction and pure honey pots (Bell, Simon

More about Literature Review On Intrusion System

Open Document