This website uses cookies to ensure you have the best experience. Learn more

An Introduction To Intrusion Detection Systems

1234 words - 5 pages

I decided to write my paper on Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) because professor mentioned these devices several times in class and I am interested in network security therefore it was a good opportunity for me to learn more about these security systems. An intrusion detection system (IDS) generally detects unwanted manipulations to computer systems, mainly through the Internet. The manipulations may take the form of attacks by crackers. An intrusion detection system is used to detect many types of malicious network traffic and computer usage that can't be detected by a conventional firewall. This includes network attacks against vulnerable ...view middle of the document...

There are several ways to categorize an IDS depending on the type and location of the sensors and the methodology used by the engine to generate alerts. In many simple IDS implementations all three components are combined in a single device or appliance.
In a network-based intrusion-detection system (NIDS), the sensors are located at choke points in the network to be monitored, often in the demilitarized zone (DMZ) or at network borders. The sensor captures all network traffic and analyzes the content of individual packets for malicious traffic. In systems, PIDS and APIDS are used to monitor the transport and protocols illegal or inappropriate traffic or constricts of language (say SQL). In a host-based system, the sensor usually consists of a software agent, which monitors all activity of the host on which it is installed. Hybrids of these two systems also exist.
Let's examine the different types of intrusion-detection systems available today. A network intrusion detection system is an independent platform which identifies intrusions by examining network traffic and monitors multiple hosts. Network Intrusion Detection Systems gain access to network traffic by connecting to a hub, network switch configured for port mirroring, or network tap. An example of a NIDS is Snort. A protocol-based intrusion detection system consists of a system or agent that would typically sit at the front end of a server, monitoring and analyzing the communication protocol between a connected device (a user/PC or system). For a web server this would typically monitor the HTTPS protocol stream and understand the HTTP protocol relative to the web server/system it is trying to protect. Where HTTPS is in use then this system would need to reside in the "shim" or interface between where HTTPS is un-encrypted and immediately prior to it entering the Web presentation layer. An application protocol-based intrusion detection system consists of a system or agent that would typically sit within a group of servers, monitoring and analyzing the communication on application specific protocols. For example; in a web server with database this would monitor the SQL protocol specific to the middleware/business-login as it transacts with the database.
I have some experience with the next type of intrusion detection system as I have used one for a couple of years on my Windows PC at home. A host-based intrusion detection system consists of an agent on a host which identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability/acl databases) and other host activities and state. I have used BlackICE, which according to the software maker, scans all inbound Internet traffic for suspicious activity on home or small business systems and stops it cold. I was quite surprised the first time I installed...

Other Papers Like An Introduction To Intrusion Detection Systems

An Introduction to Football Tactics Playmaker

5790 words - 24 pages Tactical Visions An Introduction to Football Tactics playmaker 2 Tactical Visions Tactical Visions Football Manager 2010 sees a seismic shift in the way tactics are approached from the human perspective, seeking to replace ‘slider think’ with football speak. The focus is no longer on finding the correct settings to master the simulation, but on understanding how to create a coherent tactic using proper football terminology. The best

Unit 4001 - an Introduction to Management Styles

3104 words - 13 pages Unit 4001 - An Introduction to Management Styles Name: Timothy Freeman CMI Number: P04304125 1. Be able to understand assumptions about human nature and managerial behaviour. 1.1 Identify models which make suppositions about human nature and behaviour at work Theory X and Theory Y represent two sets of assumptions about human nature and human behaviour that are relevant to the practice of management. They describe two contrasting models

An Introduction on Myself to My Proffesor

735 words - 3 pages Introduction of Myself ENG100 B84 February 18, 2014 I am in my first semester here at Midlands Technical College. I am enrolled in Reading 100 with Charles Washington and English 100 with you. In this memo I am going to give you insight on my background, interests, achievements and goals. •Background I was born in Columbia, South Carolina in 1991. I have lived here all 23 years of my life. I

B120 an Introduction to Business Studies Tma 3

1133 words - 5 pages as long as you can in your bank, without incurring penalties by using online payment facilities. I think that although late payment may save me money. I am happy to carry on being a direct debtor and knowing that no horrendous bill is going to land on my mat. Word count 217. Reference. B120 An Introduction to Business Studies; Book 3, An introduction to accounting and finance in business: 2006 The Open University.

Unit 1 - an Introduction to Working with Children

2781 words - 12 pages Unit 1 Assignment - An introduction to working with children E1. E2. Statutory sector education and care are services required by the law. The government provide the funding for these services and control the guidelines by which they are run. These services are free and accessible to all children and families. The government identifies its main statutory obligations in health, education and social services. I focused my study on Field

It Integration System: an Introduction to Erp for Ebusiness & Ecommerce Activity

3129 words - 13 pages Enterprise Resource Planning (ERP) system is a set of integrated programs that manages the core business operations for an entire multisite and global organization (Stair & Reynolds, 2012). Organization can no longer respond to market changes using nonintegrated information systems based on overnight processing of yesterday’s business transactions, conflicting data models, and obsolete technology. Today, organizations are turning to ERP software

Integrative Approaches to Psychology and Christianity: an Introduction to Worldview Issues, Philosophical Foundations, and Models of Integration

1293 words - 6 pages Integrative Approaches to Psychology and Christianity: An Introduction to Worldview Issues, Philosophical Foundations, and Models of Integration Liberty University Abstract Entwistle, D. N. (2010). Integrative approaches to psychology and christianity, an introduction to worldview issues, philosophical foundations, and models of integration. Eugene, Oregon: Cascade Books. In his book, Integrative Approaches to Psychology and

An Introduction To Afro-Caribbean Migration

1961 words - 8 pages different ethnic groups. By this I mean that there was an acknowledgment that both Gary and his friend Scott came from different ethnicity groups and should therefore keep within their groups when considering marrying. Couples often marry those of the same ethnic identity for a sense of familiarity. One may also want to spend their life with an individual who shares the same cultural ideology. This shared ideology could be political, religious, economic

An Introduction To Debt Policy And Value

559 words - 3 pages Determine whether shareholders are better off or worse off with more leverage. Using the results of problem 2, we calculated the total value per share when firm borrows money to repurchase shares. From the calculation below, we can see that total market value of equity declined from 10,000 to 6,700, while total value per share rose from $10 to $11.70. Therefore, as the firm borrows and repurchases shares, the total value of equity declined

An Introduction to Working with Children

2220 words - 9 pages children and families by having parent/teacher meetings on a regular basis to help to show how the child can progress and by show parents how they can help the child at home Voluntary services are provided by organisations such as charities where some or all funding comes from donations. One voluntary service is an after school club these are voluntary because they are funded by parents to pay members of staff and to and any surplus income is

Explain How Theories, Such as Dependency Theory and World Systems Theory Can Contribute to an Understanding of Changing Patterns of Global Power (15 Marks)

619 words - 3 pages Explain how theories, such as Dependency theory and World systems theory can contribute to an understanding of changing patterns of global power (15 marks) The changing global power of countries can be difficult to understand as there are a variety of views and theories used in order to explain the shift. The recent developments of BRIC countries has an influence upon this and may be a reason as for why theories such as the Dependency theory

Related Essays

Intrusion Detection Systems Essay

1120 words - 5 pages common attacks such as Trojans, worms, viruses etc. These attacks can really negatively impact a corporation and or small business to a severe extent, hence why most upscale companies make full use of intrusion detection systems. It is important to understand that an IDS is made up of several components. Sensors which generate security events, a console to monitor events, alerts, and control the sensors. Another component of an IDS is its

Chapter 1—Introduction To Accounting Information Systems

3566 words - 15 pages Chapter 1—Introduction to Accounting Information Systems TRUE/FALSE 1. The three themes of the text are operating systems, e-business, and internal control. ANS: F 2. In an assurance service the accountant will provide the original information used for decision making. ANS: F 3. Financial care for the elderly has been identified by the AICPA as a potential assurance service. ANS: T 4. Wireless technologies was

An Introduction To Management Styles Essay

3075 words - 13 pages Unit 4001 - An Introduction to Management Styles 1. Be able to understand assumptions about human nature and managerial behaviour. 1.1 Identify models which make suppositions about human nature and behaviour at work Theory X and Theory Y represent two sets of assumptions about human nature and human behaviour that are relevant to the practice of management. They describe two contrasting models of workforce motivation. Theory X represents a

An Introduction To Qualitative Research Essay

5060 words - 21 pages Curriculum for Excellence and the problems they face when trying to do so. Background to Study This research project focuses on children’s literacy in the early years setting, and the importance of implementing literacy into all areas of the nursery. Literacy is an important part of a child’s development and there is a number of policies and legislation put in place that practitioners need to adhere to when