logo

ANALYTICAL RESEARCH PROJECT BASED ON INTRUSION DETECTION

   

Added on  2022-10-12

15 Pages3904 Words5 Views
Running head: ANALYTICAL RESEARCH PROJECT BASED ON INTRUSION DETECTION TECHNOLOGY
Analytical Research Project based on Intrusion detection and/or prevention technology
Name of the Student
Name of the University
Author note

ANALYTICAL RESEARCH PROJECT BASED ON INTRUSION DETECTION TECHNOLOGY1
Executive Summary
The discussion in this paper focuses over the intrusion detection technologies and tools that are
mainly used by different companies and organizations in order to detect any form of intrusion
within any network. The discussion focuses over Security Onion, which is a useful tool and
which is used by different industries for monitoring the performance over their network. The
paper thus puts focuses over the implemented strategies, functional applications and limitations
presented with the help of the tool. The paper concludes by providing an overview over the
entire use of the network management tool.

ANALYTICAL RESEARCH PROJECT BASED ON INTRUSION DETECTION TECHNOLOGY2
Table of Contents
1. Introduction..................................................................................................................................2
2. Research Question.......................................................................................................................3
3. Background..................................................................................................................................3
4. Literature Review........................................................................................................................5
4.1 Usage of Security Onion........................................................................................................5
4.2 Configuration of Security Onion...........................................................................................5
4.3 Logging and Monitoring........................................................................................................6
5. Usage Methods............................................................................................................................6
5.1 Types of Data.........................................................................................................................7
5.2 Tools and Interfaces...............................................................................................................7
6. Functional Applicability..............................................................................................................8
7. Limitations of Security Onion.....................................................................................................9
8. Conclusion.................................................................................................................................10
References......................................................................................................................................11

ANALYTICAL RESEARCH PROJECT BASED ON INTRUSION DETECTION TECHNOLOGY3
1. Introduction
In the era of rising number of web applications, there is a vast need for including high
level of security within the networking environment. This provides the users a certain kind of
assurance about the type of critical functions used by the users. Different kind of critical
functions used by users are in relation with healthcare facilities, online banking services, remote
management and various other cloud services (Bezborodov, 2016). In order to secure the data
and privacy of users, there is a growing need to protect the entire network, applications, systems
and internal data, which would be in connection from intrusion till exploitation.
Intrusion Detection Systems (IDS) is defined as a useful tool based on providing alerts
and controlling the entire traffic present within a network. These tools implement anomaly-
based, signature-based and machine learning methods for bringing in changes within the process
of detecting intrusions within the network (Hermanowski, 2015). Different kind of IDS includes:
Network-based IDS (NIDS) and Host-based IDS (HIDS). The NIDS are used for monitor the
entire network while HIDS are used for monitoring the activity of host.
The discussion in this paper focuses and provides an overview of Security Onion, which
is a NIDS tool and also discusses their functionalities. The paper further discusses by considering
the functionalities and abilities of Security Onion. The other discussed parts are in relation with
the configuration, interfaces, data and system management (Park & Ahn, 2017). The discussion
further concludes by providing justification about the usefulness of the tool and their impacts
over the network settings.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information and System Security Research Paper 2022
|4
|765
|7

(Doc) Intrusion Detection System
|10
|2535
|219

Intrusion Detection System PDF
|6
|966
|48

Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289

MIT141559 IT Security Assignment: Networking Intrusion Detection Systems
|6
|1185
|131

Intrusion Detection Tools (IDS)
|3
|461
|394