logo

Network Intrusion Detection System Assignment

9 Pages1509 Words85 Views
   

Added on  2020-04-21

Network Intrusion Detection System Assignment

   Added on 2020-04-21

ShareRelated Documents
Running head: NETWORK INTRUSION DETECTION SYSTEMExploring the Usage of Multiple Gateways for Network Intrusion Detection System (NIDS)Name of the student:Name of the university:
Network Intrusion Detection System Assignment_1
1NETWORK INTRUSION DETECTION SYSTEMIntroduction In order to improve the multiple gateways for improving the defense system againstdistributed Denial of services attacks in a corporate network intrusion detection system orapproach is required to be adopted by the system developers. Each break-in cannot be detectedmanually or eventually including the holes and new attacks as well (Joshi and Pimprale 2013).Due to lack of defense power the current network systems used in the business organizations aregetting affected each day (Beigi Mohammadi et al. 2014). Thus, in order to mitigate these issueswith multiple layers different design philosophies and active intrusion detection system is neededto be developed by the network analysts. Description of a projectNowadays, network based intrusion detection system has become one of the common andsophisticated attacks. Due to this reason the network based intrusion detection system haschanges their domain of attack to the operating system from the host body. With the help ofnetwork auditing wide range of information could be produced and due to this reason the systemis currently facing severe challenges those are required to be detected and diminished as well(Bul'ajoul, James and Pannu 2015). By using the state transition diagram and state transitionanalysis technique the state as well as transition could be characterized appropriately. Through ahyper graph model the target network model can be protected accordingly. In order to carry outthe information transition particularly in the TCP/IP networks are the most important channel oftransition (Faisal et al. 2015). However, the growing rates of security threats have shifted thefocus of network analysts from internet to the operating system.
Network Intrusion Detection System Assignment_2
2NETWORK INTRUSION DETECTION SYSTEMIntrusion detection is referred to as an approach towards security which is eventuallymoving towards the networked environment. In order to detect the masqueraders and misfeasorswithin a standalone system the network owners have started using the intrusion detectionapproach (Modi et al. 2013). However, in the current days the focus of the intrusion detectionhas been shifted towards the networks. Explanation of problemsNetwork intrusion detection system is very much important to be adopted for anybusiness organization however many problems are also associated to it those are needed to bemitigated for successful implementation of the processes. The problems associated to the systemare as follows:NIDS is not applicable for IPS: The system has the ability to drop different packetswhich defines the known incorrect traffic again it can allow the good also. The activities of theIDS are almost similar to the firewall it means that, the IDS detects the anomalies, trafficviolation, malicious traffic etc those are not at all helpful from the IPS perspectives (Lin, Ke andTsai 2015). This act as an enforcement tools instead of visibility tool which is a major identifiedissue. Does not focus on IDS catches: The IDS fail to catch the intruders those are anothermajor problems associated to it. It is defined that, the company would be failing to gaininformation from the system. On the other hand lacks of security, well defined managementinterface are the other problems associated to this.
Network Intrusion Detection System Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Management: Intrusion Detection, Firewalls, and Operating System Security
|4
|778
|289

Network Intrusion Detection System - Doc
|20
|3583
|59

Signs of a Network Data Breach & How to Prevent One
|6
|1682
|13

Network Intrusion: Sources, Effects and Prevention
|10
|1815
|434

Next Generation Firewall and IT Security
|9
|1504
|68

Classification of Bluetooth Smart Technology Attacks and Defenses
|29
|5740
|58