logo

Effectiveness of Intrusion Detection System in LAN Network

   

Added on  2023-06-14

8 Pages2383 Words95 Views
Interpretation and Critique of Research Findings

Contents
Introduction:...............................................................................................................................2
Discussion..................................................................................................................................2
Reflection...................................................................................................................................4
Conclusion..................................................................................................................................6
References..................................................................................................................................7

Introduction:
The proposed paper assists in focusing on the effectiveness of the Intrusion detection system
(IDS) implemented in the LAN network system. The security level of the physical and
conceptual asset can be improved with the implementation of IDS environment. The
evaluation of the IDS in preventing the four different attacks helps in analysing the efficiency
and effectiveness of the IDS environment. The analysis of the findings highlights the
significance of IDS system implemented in the LAN network.
Discussion
The experimental design of the LAN is set up for the deployment of two server, firewall, and
switches. The IDS database was created to monitors attacks on the network. The Installation
of the IDS is the major concern for handling the packets over network. The Open source host
based intrusion detection system (OSSEC) installation is preferred for the 1st IDS which is
best suitable for the Window 7 server. The 2nd IDS was installed with the help of prelude
environment. Protected archive distribution system (PADS) installation is preferred for the 3rd
IDS. These systems of installation are used by the author on the basis of his pattern of
evaluation. The alerts are generated by the IDS configuration for the deployment of the
forensic result of the attacks.
The author had done the successful implementation of IDS environment which was required
to perform the activity of attacks. The attacks were performed to analyse the success of the
IDS environment in protecting the premises from the damage which can be caused from the
attack. The Reconnaissance attack was performed on the Linux operating system. The denial
of service attack was performed on the other network. The status of both the attacks have
been checked and compared for before and after systems. The result of the denial of service
attack can be measured by the difference in graph:
The demonstration of the experimentation designed by the author helps in achieving the
security. The effective result can be drawn from further experimental setup. The Denial of
service attack was the dictionary attack which is launched by creating the different profiles of
usernames and password. The flow of packet should be monitored on the wireshark software.
The capability of handling traffic on the wireshark operating system helps in judging the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Architecture, Attacks, and Prevention
|13
|3784
|59

Justification for choosing Snort as IDS
|4
|708
|101

Intrusion Detection System and Snort: A Comprehensive Guide
|8
|857
|312

Issues with Wi-Fi technology within HSBC Bank
|18
|5079
|351

Networking and Security
|4
|801
|57

Demonstration of Network Security Tools
|10
|2109
|85