Ask a question from expert

Ask now

Network Intrusion Detection System - Doc

20 Pages3583 Words59 Views
   

Added on  2020-04-21

Network Intrusion Detection System - Doc

   Added on 2020-04-21

BookmarkShareRelated Documents
Running head: NETWORK INTRUSION DETECTION SYSTEMS
Exploring the Use of Multiple Gateways for Network Intrusion Detection Systems
Name of the student:
Name of the university:
Network Intrusion Detection System - Doc_1
1NETWORK INTRUSION DETECTION SYSTEMS
Table of Contents
1. Background of Network Intrusion detection system...................................................................2
2. Project methodologies associated to Network Intrusion detection system..................................3
3. Project plan for Network Intrusion detection system or Gantt chart...........................................5
3.1 Explanation of the problem...................................................................................................5
3.2 Evaluation..............................................................................................................................5
3.3 Development of project schedule..........................................................................................7
3.3.1 Schedule of the project...................................................................................................8
3.3.2 Work Breakdown Structure of the project....................................................................13
3.2.3 Resource list for the project..........................................................................................13
4. Development of project objectives............................................................................................16
References......................................................................................................................................18
Network Intrusion Detection System - Doc_2
2NETWORK INTRUSION DETECTION SYSTEMS
1. Background of Network Intrusion detection system
After analyzing the current edge of technology and its advanced implementation in the
network systems, it has been defined that security is one of the biggest issues to be highlighted.
In order to avoid unauthenticated information access from the system the network administrators
must adopt accurate prevention measures for protecting the information from different potential
security threats (Beigi Mohammadi et al. 2014). Within the government, individual and business
requirements the computer networks those are involved needs proper security from the business
perspectives. One of the most ordinary and easy way of network protection could be done by
accessing it with proper id and its corresponding password as well.
Network intrusion detection system is also known as the Intrusion detection system or
preventative systems. Malicious activities within the network system and log data including
activities, step stopping and final report developments are monitored and controlled with the help
of intrusion detection system (Bul'ajoul, James and Pannu 2015). Within the network system if
any such malicious activities are highlighted then, intrusion detection system would be able to
send accurate alarm against the malicious activity. In order to save the IP addresses from any
kind of obstructions the network intrusion detection system is very much helpful. In addition to
this it could establish accurate connection between the datagram or information packet to the
network systems. Additionally, there are certain following actions are also associated to it that is
performed by the system are as follows:
Cyclic Redundancy checking could be done for identifying different system level
errors
The TCP level sequencing issues could also be prevented
Network Intrusion Detection System - Doc_3
3NETWORK INTRUSION DETECTION SYSTEMS
Unwanted transport and network layer options could be cleaned up
Intrusion Detection System (IDS) those are based upon network system helps to monitor
the activities of the network system. In order to share the project resources, file exchange details
and other electronic communication approaches this particular approach is very much helpful.
This is an approach of event monitoring and control. All possible incidents are the primary focus
of IDS. The information of the incidents those are relevant to the events of the observation are
stored by the IDS system for further analysis. In order to deal with the attacks and unauthorized
access the DS is found to be very much helpful. Through the collection of different information
from the possible security issues are also analyzed with the help of the IDS system. The features
of the IDS are as follows:
The activities of the users and their systems are monitored and controlled
Detail analysis of both the system and its vulnerabilities are possible
The integrity of critical systems and information files access become easier
2. Project methodologies associated to Network Intrusion detection system
Based on the details of the project topic, different project managers follows separate
project methodologies. In order to detect the incidents taking place over the network different
methodologies are applied. Most of the systems use multiple methodologies for detecting the
incidents either integrating the methodologies or by using them separately. It helps to serve
accurate detection power with a broad area. In case of Network Intrusion Detection System
(NIDS), the methodologies those have been followed by the project manager are as follows:
Detection approach, based upon signature
Network Intrusion Detection System - Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Intrusion Detection System PDF
|6
|966
|48

Signs of a Network Data Breach & How to Prevent One
|6
|1682
|13

Network Intrusion Detection System Assignment
|9
|1509
|85

Information and System Security Research Paper 2022
|4
|765
|7

Task 1. Based on the case study, identify and analyse a
|11
|4510
|1781

Assessment | DIPLOMA IN NETWORKING (LEVEL 7)
|13
|4898
|279