{"id":12916,"date":"2018-09-24T12:28:40","date_gmt":"2018-09-24T12:28:40","guid":{"rendered":"https:\/\/www.inspirenignite.com\/jntuh\/?p=12916"},"modified":"2021-11-05T05:15:32","modified_gmt":"2021-11-05T05:15:32","slug":"jntuh-m-tech-2017-2018-r17-detailed-syllabus-intrusion-detection-and-prevention-systems","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-m-tech-2017-2018-r17-detailed-syllabus-intrusion-detection-and-prevention-systems\/","title":{"rendered":"JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Intrusion Detection and Prevention Systems"},"content":{"rendered":"<p>Intrusion Detection and Prevention Systems Detailed Syllabus for Cyber Forensics &amp; Information Security \/ Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Intrusion Detection and Prevention Systems M.Tech 2017-2018 (R17) first year second sem is as follows.<\/p>\n<p>M.Tech. I Year II Sem.<\/p>\n<p><strong>Course Objectives:<\/strong><\/p>\n<ul>\n<li>To understand about the intruders.<\/li>\n<li>To know the intrusion detection and prevention policies<\/li>\n<\/ul>\n<p><strong>UNIT- I : INTRODUCTION:<\/strong> Understanding Intrusion Detection \u2013 Intrusion detection and prevention basics \u2013 IDS and IPS analysis schemes, Attacks, Detection approaches \u2013Misuse detection \u2013 anamoly detection \u2013 specification based detection \u2013 hybrid detection THEORETICAL FOUNDATIONS OF DETECTION: Taxonomy of anomaly detection system \u2013 fuzzy logic \u2013 Bayes theory \u2013 Artificial Neural networks \u2013 Support vector machine \u2013 Evolutionary computation \u2013 Association rules \u2013 Clustering<\/p>\n<p><strong>UNIT- II : ARCHITECTURE AND IMPLEMENTATION:<\/strong> Centralized \u2013 Distributed \u2013 Cooperative Intrusion Detection &#8211; Tiered architecture<\/p>\n<p><strong>UNIT- III : JUSTIFYING INTRUSION DETECTION:<\/strong> Intrusion detection in security \u2013 Threat Briefing \u2013Quantifying risk \u2013 Return on Investment (ROI)<\/p>\n<p><strong>UNIT- IV : APPLICATIONS AND TOOLS:<\/strong> Tool Selection and Acquisition Process &#8211; Bro Intrusion Detection \u2013 Prelude Intrusion Detection &#8211; Cisco Security IDS &#8211; Snorts Intrusion Detection \u2013 NFR security<\/p>\n<p><strong>UNIT- V : LEGAL ISSUES AND ORGANIZATIONS STANDARDS:<\/strong> Law Enforcement \/ Criminal Prosecutions \u2013 Standard of Due Care \u2013 Evidentiary Issues, Organizations and Standardizations.<\/p>\n<p><strong>REFERENCES:<\/strong><\/p>\n<ul>\n<li>Ali A. Ghorbani, Wei Lu, \u201cNetwork Intrusion Detection and Prevention: Concepts and Techniques\u201d, Springer, 2010.<\/li>\n<li>Carl Enrolf, Eugene Schultz, Jim Mellander, \u201cIntrusion detection and Prevention\u201d, McGraw Hill, 2004<\/li>\n<li>Paul E. Proctor, \u201cThe Practical Intrusion Detection Handbook \u201c,Prentice Hall , 2001.<\/li>\n<li>Ankit Fadia and Mnu Zacharia, \u201cIntrusiion Alert\u201d, Vikas Publishing house Pvt., Ltd, 2007.<\/li>\n<li>Earl Carter, Jonathan Hogue, \u201cIntrusion Prevention Fundamentals\u201d, Pearson Education, 2006.<\/li>\n<\/ul>\n<p>For all other M.Tech 1st Year 2nd Sem syllabus go to <a href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-first-year-second-sem-cyber-forensics-information-security-cyber-security-for-m-tech-2017-2018-r17-batch\/\">JNTUH M.Tech Cyber Forensics &amp; Information Security \/ Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.<\/a><\/p>\n<p>All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intrusion Detection and Prevention Systems Detailed Syllabus for Cyber Forensics &amp; Information Security \/ Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[73,62],"tags":[],"class_list":["post-12916","post","type-post","status-publish","format-standard","hentry","category-m-tech","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/12916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=12916"}],"version-history":[{"count":2,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/12916\/revisions"}],"predecessor-version":[{"id":14768,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/12916\/revisions\/14768"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=12916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=12916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=12916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}