Portable Intrusion Detection System
Harshitha Prasad Rao1, Anirudh M.R2, Diksha U.S3, Bhuvana Suganthi D4

1Harshitha Prasad Rao*, Student, Department of Electronics and Communication Engineering, B.N.M Institute of Technology, Bangalore, India.
2Anirudh M.R, Student, Department of Electronics and Communication Engineering, B.N.M Institute of Technology, Bangalore, India.
3Diksha U.S, Student, Department of Electronics and Communication Engineering, B.N.M Institute of Technology, Bangalore, India.
4Dr. Bhuvana Suganthi D, Associate Professor, Department of Electronics and Communication Engineering, B.N.M Institute of Technology, Bangalore, India.

Manuscript received on June 08, 2020. | Revised Manuscript received on June 25, 2020. | Manuscript published on June 30, 2020. | PP: 1257-1260 | Volume-9 Issue-5, June 2020. | Retrieval Number: E1218069520/2020©BEIESP | DOI: 10.35940/ijeat.E1218.069520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Every network connection made is exposed to a security threat. Due to this, crucial, confidential, important information can be lost or even exploited by an intruder. Hence an intrusion detection system (IDS) is needed to detect and notify the network administrators if such an event occurs. Though such systems are present in organizations, it is confined to a device or a rack. In this proposed system, an open source network intrusion detection system called SNORT is installed on to a Raspberry Pi. This is then implemented at a switch level, where it is connected to a configured SPAN port of a switch and is used to monitor the traffic through the switch. This system provides logs and information of the traffic, as well as notifies the network administrator through a message in real time. The intrusion detection system’s portability, ability to notify the administrator, and the display of packet information is what makes this system, more advanced and convenient for any organization’s security. 
Keywords: Intrusion, NIDS, SNORT, SPAN, Security