Back close

Course Detail

Course Name Intrusion Detection & Prevention Systems
Course Code 23AID453
Program B.Tech in Artificial Intelligence and Data Science
Campus Coimbatore , Amritapuri ,Faridabad , Bangaluru, Amaravati

Syllabus

Unit 1

Introduction to Intrusion Detection and Prevention Systems – Overview of Intrusion Detection and Prevention Systems – Types of Intrusions – Goals and Requirements of Intrusion Detection and Prevention Systems – Differences between IDS and IPS

Unit 2

Network Security Fundamentals – Network Security Basics – OSI Reference Model – TCP/IP Protocol Suite – Network Security Threats – Network-Based IDS – NIDS Architecture – NIDS Detection Techniques – Snort: An Open Source NIDS – Snort Rules – Host-Based IDS – HIDS Architecture – HIDS Detection Techniques – OSSEC: An Open Source HIDS – OSSEC Rules – Anomaly Detection – Anomaly Detection and Classification – Machine Learning Techniques for Anomaly Detection

Unit 3

Intrusion Prevention Systems – IPS Architecture and Mechanisms – Signature-Based IPS – Behavior-Based IPS

Objectives and Outcomes

Course Objectives

  • This course helps the students to understand the basics of intrusion detection and prevention systems, including concepts of intrusion detection, types of intrusions, vulnerabilities, and threats.
  • This course helps the students to learn the different types of intrusions and their potential impacts.
  • This course also provides methods to explore different techniques and methodologies for intrusion detection and prevention.
  • This course will help students to gain practical experience with popular intrusion detection and prevention systems.

Course Outcomes

After completing this course, students will be able to

CO1

Analyze the characteristics of various network attacks and select appropriate intrusion detection and prevention techniques to mitigate the associated risks.

CO2

Configure open-source intrusion detection and prevention systems to detect and prevent network attacks

CO3

Implement machine learning and deep learning models for detecting intrusions

CO4

Analyze the effectiveness of intrusion detection and prevention systems

CO-PO Mapping

PO/PSO

PO1

PO2

PO3

PO4

PO5

PO6

PO7

PO8

PO9

PO10

PO11

PO12

PSO1

PSO2

PSO3

CO

CO1

1

1

2

2

2

1

1

2

1

CO2

1

1

1

1

3

2

2

2

1

1

CO3

3

2

2

2

3

2

2

2

3

2

1

CO4

1

1

1

1

1

1

1

1

Evaluation Pattern

Evaluation Pattern

Assessment

Internal/External

Weightage (%)

Assignments (minimum 2)

Internal

30

Quizzes (minimum 2)

Internal

20

Mid-Term Examination

Internal

20

Term Project/ End Semester Examination

External

30

Text Books / References

Text Books / References

Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts and Techniques”, Springer, 2010.

Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”, McGraw Hill, 2004

Paul E. Proctor, “The Practical Intrusion Detection Handbook “, Prentice Hall, 2001.

Ankit Fadia and Mnu Zacharia, “Intrusiion Alert”, Vikas Publishing house Pvt., Ltd, 2007.

Earl Carter, Jonathan Hogue, “Intrusion Prevention Fundamentals”, Pearson Education, 2006.

Rafeeq Ur Rehman. Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Prentice Hall Professional, 2003.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now