Syllabus
Unit 1
Introduction to Intrusion Detection and Prevention Systems – Overview of Intrusion Detection and Prevention Systems – Types of Intrusions – Goals and Requirements of Intrusion Detection and Prevention Systems – Differences between IDS and IPS
Unit 2
Network Security Fundamentals – Network Security Basics – OSI Reference Model – TCP/IP Protocol Suite – Network Security Threats – Network-Based IDS – NIDS Architecture – NIDS Detection Techniques – Snort: An Open Source NIDS – Snort Rules – Host-Based IDS – HIDS Architecture – HIDS Detection Techniques – OSSEC: An Open Source HIDS – OSSEC Rules – Anomaly Detection – Anomaly Detection and Classification – Machine Learning Techniques for Anomaly Detection
Unit 3
Intrusion Prevention Systems – IPS Architecture and Mechanisms – Signature-Based IPS – Behavior-Based IPS
Objectives and Outcomes
Course Objectives
- This course helps the students to understand the basics of intrusion detection and prevention systems, including concepts of intrusion detection, types of intrusions, vulnerabilities, and threats.
- This course helps the students to learn the different types of intrusions and their potential impacts.
- This course also provides methods to explore different techniques and methodologies for intrusion detection and prevention.
- This course will help students to gain practical experience with popular intrusion detection and prevention systems.
Course Outcomes
After completing this course, students will be able to
CO1
|
Analyze the characteristics of various network attacks and select appropriate intrusion detection and prevention techniques to mitigate the associated risks.
|
CO2
|
Configure open-source intrusion detection and prevention systems to detect and prevent network attacks
|
CO3
|
Implement machine learning and deep learning models for detecting intrusions
|
CO4
|
Analyze the effectiveness of intrusion detection and prevention systems
|
CO-PO Mapping
PO/PSO
|
PO1
|
PO2
|
PO3
|
PO4
|
PO5
|
PO6
|
PO7
|
PO8
|
PO9
|
PO10
|
PO11
|
PO12
|
PSO1
|
PSO2
|
PSO3
|
CO
|
CO1
|
1
|
1
|
–
|
–
|
2
|
2
|
–
|
2
|
–
|
–
|
–
|
1
|
1
|
2
|
1
|
CO2
|
1
|
1
|
1
|
1
|
3
|
2
|
–
|
2
|
–
|
–
|
–
|
2
|
1
|
–
|
1
|
CO3
|
3
|
2
|
2
|
2
|
3
|
2
|
–
|
2
|
–
|
–
|
–
|
2
|
3
|
2
|
1
|
CO4
|
1
|
1
|
–
|
–
|
1
|
1
|
–
|
1
|
–
|
–
|
–
|
1
|
–
|
1
|
1
|
Text Books / References
Text Books / References
Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts and Techniques”, Springer, 2010.
Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw Hill, 2004
Paul E. Proctor, “The Practical Intrusion Detection Handbook “, Prentice Hall, 2001.
Ankit Fadia and Mnu Zacharia, “Intrusiion Alert”, Vikas Publishing house Pvt., Ltd, 2007.
Earl Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education, 2006.
Rafeeq Ur Rehman. Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional, 2003.