Running head: NETWORK INTRUSION DETECTION SYSTEMS Exploring the Use of Multiple Gateways for Network Intrusion Detection Systems Name of the student: Name of the university:
1NETWORK INTRUSION DETECTION SYSTEMS Table of Contents 1. Background of Network Intrusion detection system...................................................................2 2. Project methodologies associated to Network Intrusion detection system..................................3 3. Project plan for Network Intrusion detection system or Gantt chart...........................................5 3.1 Explanation of the problem...................................................................................................5 3.2 Evaluation..............................................................................................................................5 3.3 Development of project schedule..........................................................................................7 3.3.1 Schedule of the project...................................................................................................8 3.3.2 Work Breakdown Structure of the project....................................................................13 3.2.3 Resource list for the project..........................................................................................13 4. Development of project objectives............................................................................................16 References......................................................................................................................................18
2NETWORK INTRUSION DETECTION SYSTEMS 1. Background of Network Intrusion detection system After analyzing the current edge of technology and its advanced implementation in the network systems, it has been defined that security is one of the biggest issues to be highlighted. In order to avoid unauthenticated information access from the system the network administrators must adopt accurate prevention measures for protecting the information from different potential security threats (Beigi Mohammadiet al. 2014). Within the government, individual and business requirements the computer networks those are involved needs proper security from the business perspectives. One of the most ordinary and easy way of network protection could be done by accessing it with proper id and its corresponding password as well. Network intrusion detection system is also known as the Intrusion detection system or preventative systems. Malicious activities within the network system and log data including activities, step stopping and final report developments are monitored and controlled with the help of intrusion detection system (Bul'ajoul, James and Pannu 2015). Within the network system if any such malicious activities are highlighted then, intrusion detection system would be able to send accurate alarm against the malicious activity. In order to save the IP addresses from any kind of obstructions the network intrusion detection system is very much helpful. In addition to this it could establish accurate connection between the datagram or information packet to the network systems. Additionally, there are certain following actions are also associated to it that is performed by the system are as follows: Cyclic Redundancy checking could be done for identifying different system level errors The TCP level sequencing issues could also be prevented
3NETWORK INTRUSION DETECTION SYSTEMS Unwanted transport and network layer options could be cleaned up Intrusion Detection System (IDS) those are based upon network system helps to monitor the activities of the network system. In order to share the project resources, file exchange details and other electronic communication approaches this particular approach is very much helpful. This is an approach of event monitoring and control. All possible incidents are the primary focus of IDS. The information of the incidents those are relevant to the events of the observation are stored by the IDS system for further analysis. In order to deal with the attacks and unauthorized access the DS is found to be very much helpful. Through the collection of different information from the possible security issues are also analyzed with the help of the IDS system. The features of the IDS are as follows: The activities of the users and their systems are monitored and controlled Detail analysis of both the system and its vulnerabilities are possible The integrity of critical systems and information files access become easier 2. Project methodologies associated to Network Intrusion detection system Based on the details of the project topic, different project managers follows separate project methodologies. In order to detect the incidents taking place over the network different methodologies are applied. Most of the systems use multiple methodologies for detecting the incidents either integrating the methodologies or by using them separately. It helps to serve accurate detection power with a broad area. In case of Network Intrusion Detection System (NIDS), the methodologies those have been followed by the project manager are as follows: Detection approach, based upon signature
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Intrusion Detection System PDFlg...
|6
|966
|48
Signs of a Network Data Breach & How to Prevent Onelg...
|6
|1682
|13
Network Intrusion Detection System Assignmentlg...
|9
|1509
|85
Information and System Security Research Paper 2022lg...
|4
|765
|7
Task 1. Based on the case study, identify and analyse alg...