A basic cornerstone of security is to verify the integrity of fundamental data stored in the system. This integrity checking is being achieved using integrity tools such Tripwire, which depend on the integrity and proper operation of the operating system, i.e. these applications assume that the operating system always operates correctly. When this assumption is not valid, the integrity applications cannot provide a reliable result, and consequently may provide a false negative. Once the operating system is compromised, a novice attacker, using tools widely available on the Internet (rootshell.com, etc), could easily defeat integrity tools that rely on the operating system.A novel way to overcome this traditional integrity problem is to use an independent auditor. The independent auditor uses an out-of-band verification process that does not depend on the underlying operating system. The resultant system provides extremely strong integrity guarantees, detecting modifications to approved objects as well as detecting the existence of unapproved and thus unsigned objects. This is accomplished without any modifications to the host operating system. StrongARM EBSA-285 Evaluation Board, with a SA-110 microprocessor and 21285 core logic can be used as auditors.

These snippets from Web resource, please do read whole report for more information.

Book: Intrusion Detection by Rebecca Gurley Bace
Web resources: Using Independent Auditors as Intrusion Detection Systems
Power Point Presentation (PPT): IDSIC: A Modeling of Intrusion Detection System with Identification Capability

I would like to suggest you to try network intrusion detection systems that can be taken from internet to and tested on local network of computer to present results in seminar. Also you can find intrusion detection features in network security software and network security appliance and service software. Download them and test with your local college network to present the result in seminar. The will definitely make your presentation more exciting and worth working. You may extend your seminar work to final year project too.

If you have any questions, comments, or suggestions please do not hesitate to write a comment. We are targeting for over 1000 latest and advanced seminar topics for Computer Science, MCA and IT students.
For updates on seminar topics and other engineering related news please subscribe through email. A subscribe box is given on the top right corner.