logo

(Doc) Intrusion Detection System

10 Pages2535 Words219 Views
   

Added on  2021-06-15

(Doc) Intrusion Detection System

   Added on 2021-06-15

ShareRelated Documents
Intrusion Detection SystemStudent’s nameInstitution Affiliation(s)
(Doc) Intrusion Detection System_1
IntroductionThe fear of malicious attack has made us aware of securing our computer systems. Earlier, the information and data were stored in a central computer system, but now it has been moved to the cloud like environment. These internet based technologies have made flexible data access and motivated the mobile workforce, but it has also increased the danger of being attacked. One loophole can harm your organization or breach your private data. Firewalls are used to secure the networks, but they are not sufficient when these systems are becoming so vast(Chen, 2013). These now can be protected using intrusion detection system (IDS) which are usedon two level- host level (HIDS) and network level ids (NIDS). HIDS aim to protect single computer systems which are capable of detecting any malicious activity to be attacked on that particular computer system. These are also called sensors and are required for every machine. They increase the security as it is impossible to attack so many NIDS installed on each system. These sensors monitor the data being passed and the events going on the system in which it is installed. HIDS are heavily dependent on audit trails and are manufacturer dependent. HIDS are capable of detecting who is using the system and can trace any improper activity with a specific id. They are competent enough of working in switched topology environment and can also work on the encrypted environment(Fung & Boutaba, 2014). Network level IDSNIDS works at the network level; it means they are not securing single computer but the whole network. They monitor the data traveling on any of the network segment. Hence they are more capable. Each of the NIDS comes with attack signatures which are the definition of attack. These sensors alert if there are some improper activity found. Using NIDS is more appropriate asit will not degrade the performance of the entire system. Another advantage is that monitoring
(Doc) Intrusion Detection System_2
process will be transparent to all hosts. Installing HIDS needs expertise while installment of NIDS doesn’t(Herrero & Corchado, 2011). NIDS are widely used, and they are one of the majorcomponents in a network. These systems help to prevent the intrusion and attacks by using a unique mechanism. Intrusion detection system detects and protects the network system from threats and attacks. It is the essential component of the network system. It is mandatory for the network systems to install an intrusion detection system to efficiently manage the attacks and resolve the issues(M., 2011). There are various kinds of IDS, and they are implemented based on the network system. These intrusion systems have been designed using multiple techniques. The intrusion system developed with the help of classification technique is the popular ones as it provides more security to the systems in which it is installed. The classification technique is usedto classify the type of attack the system faces. The intrusion system has the responsibility of protecting the system and preventing the attacks(Pez, 2011). Network intrusion systems using classification techniques are widely used, and there are many articles have been written on this system.Security threats and IDSSecurity threats may occur at any time. Detection systems must be alert to identify and report the risks to the administrator. Several activities take place within a network. Any abnormalevent has to be analyzed by the detection system. A user will have certain limitations in accessing a network(Chen, 2013). User policy is maintained by the organization. Each of the user’s activity is recorded by the system. It tracks the user’s movements and sends a report if the user violates the policy. Security threats and attacks can be in any form and can occur even in a highly secured network. Since the number of threats and attacks is increasing, an active IDS is necessary. Network attacks are more natural than intruding into a standalone system. As the
(Doc) Intrusion Detection System_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information and System Security Research Paper 2022
|4
|765
|7

Intrusion Detection System PDF
|6
|966
|48

Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289

MN692 Capstone Project (pdf)
|20
|4252
|34

Information and Systems Security
|7
|1270
|80

MIT141559 IT Security Assignment: Networking Intrusion Detection Systems
|6
|1185
|131