Unit 1
Introduction to Intrusion Detection and Prevention Systems – Overview of Intrusion Detection and Prevention Systems – Types of Intrusions – Goals and Requirements of Intrusion Detection and Prevention Systems – Differences between IDS and IPS
| Course Name | Intrusion Detection & Prevention Systems |
| Course Code | 23AID453 |
| Program | B.Tech in Artificial Intelligence and Data Science |
| Campus | Coimbatore , Amritapuri ,Faridabad , Bangaluru, Amaravati |
Introduction to Intrusion Detection and Prevention Systems – Overview of Intrusion Detection and Prevention Systems – Types of Intrusions – Goals and Requirements of Intrusion Detection and Prevention Systems – Differences between IDS and IPS
Network Security Fundamentals – Network Security Basics – OSI Reference Model – TCP/IP Protocol Suite – Network Security Threats – Network-Based IDS – NIDS Architecture – NIDS Detection Techniques – Snort: An Open Source NIDS – Snort Rules – Host-Based IDS – HIDS Architecture – HIDS Detection Techniques – OSSEC: An Open Source HIDS – OSSEC Rules – Anomaly Detection – Anomaly Detection and Classification – Machine Learning Techniques for Anomaly Detection
Intrusion Prevention Systems – IPS Architecture and Mechanisms – Signature-Based IPS – Behavior-Based IPS
Course Objectives
Course Outcomes
After completing this course, students will be able to
|
CO1 |
Analyze the characteristics of various network attacks and select appropriate intrusion detection and prevention techniques to mitigate the associated risks. |
|
CO2 |
Configure open-source intrusion detection and prevention systems to detect and prevent network attacks |
|
CO3 |
Implement machine learning and deep learning models for detecting intrusions |
|
CO4 |
Analyze the effectiveness of intrusion detection and prevention systems |
CO-PO Mapping
|
PO/PSO |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
PSO3 |
|
CO |
|||||||||||||||
|
CO1 |
1 |
1 |
– |
– |
2 |
2 |
– |
2 |
– |
– |
– |
1 |
1 |
2 |
1 |
|
CO2 |
1 |
1 |
1 |
1 |
3 |
2 |
– |
2 |
– |
– |
– |
2 |
1 |
– |
1 |
|
CO3 |
3 |
2 |
2 |
2 |
3 |
2 |
– |
2 |
– |
– |
– |
2 |
3 |
2 |
1 |
|
CO4 |
1 |
1 |
– |
– |
1 |
1 |
– |
1 |
– |
– |
– |
1 |
– |
1 |
1 |
Evaluation Pattern
|
Assessment |
Internal/External |
Weightage (%) |
|
Assignments (minimum 2) |
Internal |
30 |
|
Quizzes (minimum 2) |
Internal |
20 |
|
Mid-Term Examination |
Internal |
20 |
|
Term Project/ End Semester Examination |
External |
30 |
Text Books / References
Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts and Techniques”, Springer, 2010.
Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw Hill, 2004
Paul E. Proctor, “The Practical Intrusion Detection Handbook “, Prentice Hall, 2001.
Ankit Fadia and Mnu Zacharia, “Intrusiion Alert”, Vikas Publishing house Pvt., Ltd, 2007.
Earl Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education, 2006.
Rafeeq Ur Rehman. Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional, 2003.
DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.