StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Bro: A System for Dectecting Network Intruders in Real-Time - Essay Example

Cite this document
Summary
The system has system designs that are meant to emphasize high speed monitoring, clear separation between the policy and mechanism, and real time…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Bro: A System for Dectecting Network Intruders in Real-Time
Read Text Preview

Extract of sample "Bro: A System for Dectecting Network Intruders in Real-Time"

Bro: A System for Detecting Network Intruders in Real-Time Overview Bro, a standalone system detector is described by passively monitoring a network that links over the intruder’s traffic transit. The system has system designs that are meant to emphasize high speed monitoring, clear separation between the policy and mechanism, and real time notifications (Paxson, 1998). The policy has various advantages that enable event handlers to synthesize new events, update state information, record the information to disks, as well as generate real time notifications through the syslog.

Most importantly, it enables the reduction of kernel-filtered network traffic stream into series of high level events.BodyThe growing internet connectivity has created growing opportunities for attackers to unlawfully get their way in computers over the networks. The setback of detecting such attacks is referred to as network intrusion detection, which is a relatively new area of security research. These systems can be divided into two types; those that operate alone by observing network traffic directly and passively using a packet filter, and those that depend on audit information that is gathered by the host in the network that they are trying to protect (Paxson, 1998).

There is an increasing interest on building hybrid systems that will combine these two approaches. Bro is abstractly divided into an event engine that enables the reduction of stream of filtered packets to the stream of high level network events, and an interpreter specialized for language used in expressing site security policy (Paxson, 1998). Structurally, it is set in layers, with the lower layer processing the greatest volume of data. As one goes high through the layers, the data system diminishes giving room for processing of data per item.

This system has various advantages that makes anyone who uses it recognize its reliability. It has high speed and large mechanisms for monitoring the environment. It enables us view the supreme source of threats as external hosts when connecting to the host over the internet. It also offers real time notifications, as well as enables full recording of every attacker’s network activity (Paxson, 1998). It has also separated mechanism from policy; this buys flexibility and simplicity. This is advantageous since it helps handle the high volume of traffic.

Lastly, I loved this system because it can access the monitor code; thus, enabling the detection of the attacker’s break-in activity. Additionally, this system has the most impressive record in the way it is able to avoid simple mistakes; that is to say it is reliable. It is free, simple and capable of avoiding defiance of the security policy by being both clear and error free. This system enables us understand the security and management by having a clear overview of its structures and the language used in expressing security policy.

The system is implemented with specialized analysis; thus, it uses regular expression matching records, rather than reusing existing ones (Paxson, 1998). There are hopes that the system is going to benefit the community in the ongoing operations without incurring any packet drops. Security management might be a hard task due to problems such as overload attacks, crash attacks, and subterfuge attacks. Unless we are careful keeping track on these contiguous data, the obvious attack will keep reoccurring.

ReferencesPaxson, V. (1998). Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 1-22.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Bro: A System for Dectecting Network Intruders in Real-Time Essay”, n.d.)
Bro: A System for Dectecting Network Intruders in Real-Time Essay. Retrieved from https://studentshare.org/information-technology/1609448-bro-a-system-for-dectecting-network-intruders-in-real-time
(Bro: A System for Dectecting Network Intruders in Real-Time Essay)
Bro: A System for Dectecting Network Intruders in Real-Time Essay. https://studentshare.org/information-technology/1609448-bro-a-system-for-dectecting-network-intruders-in-real-time.
“Bro: A System for Dectecting Network Intruders in Real-Time Essay”, n.d. https://studentshare.org/information-technology/1609448-bro-a-system-for-dectecting-network-intruders-in-real-time.
  • Cited: 0 times

CHECK THESE SAMPLES OF Bro: A System for Dectecting Network Intruders in Real-Time

Importance of Information Security and Privacy

Although there are several methods to prevent unauthorised access; users occasionally are able to get through the security systems, and it is therefore essential for organizations to also be capable f detecting intruders.... Before beginning to discuss how networks can be secured to improve the prevention f intruders, the reason why it is important to prevent intruders will be pointed out to help understand why network security is vital for many businesses....
6 Pages (1500 words) Essay

Importance of The Aviation Security

It has to be seen that armed with the tremendous improvements in technology, communications, weaponry, and transportation systems, the unscrupulous terrorist elements are better able to network their plans and actions.... The essay "Importance of The Aviation Security" discusses a realization that the concept of Airport Security was increasingly becoming a fallacy and that the key risks lay in the management of the airline and airport security in the West....
6 Pages (1500 words) Essay

Wireless Intrusion Detection Systems

The active systems can transmit signals to inquire the status of the network and also put in malicious data into the network to create interruptions.... The 'Wardriver' moves near the wireless network area expecting to detect IEEE 802.... The Wardriver may also get other details of the network such as the Service Set Identifier (SSID).... Intruder by means of AirSnort would clandestinely gather wireless network traffic of the intended network....
4 Pages (1000 words) Essay

Real Time Embedded Systems

or successful development of the software industry, especially in the case of an embedded system, it is essential to manage the evolution of a system.... It performs tasks at much lower cost than normal computers and as per real-time constraints.... They have to interact with various devices in the network, where every application needs a different software version.... This paper outlines that in general, an embedded system is a hardware programmed for a specific task....
10 Pages (2500 words) Assignment

IDS Systems - Snort and Bro

hellip; For a high-speed environment, the Snort is not a good option, and also it is not a system for testing and modifying.... Snort can effortlessly be organized on any knob of a computer network, with trifling disturbances to processes.... asically, an intrusion detection system is an application or device utilized to scrutinize the entire network traffic and notify the administrator or user when there has been an illegal effort or access....
12 Pages (3000 words) Case Study

Bro: A System for Detecting Network Intruders in Real-Time

The paper "Bro: A System for Detecting network intruders in real-time" highlights that the real-time full recordings of the network threats enable the owners of the network to be in a state of constant lookout for any further intrusion threats, thus helping to keep the system more secure.... Therefore, the Bro system works to defeat the network intrusion problem by using a variety of feature-combinations that creates a system for identifying and reporting the network intrusion traffic in real time....
5 Pages (1250 words) Essay

Intrusion Detection System

Generally, there are basic things to consider when choosing a security system for a facility.... In addition, it should be able to delay the intruders' entry to the point of giving the security team time to prepare to counter the attack.... Moreover, it should provide a way for the security team to assess the security situation and finally allow them to respond without exposing them to the intruders.... This report "Intrusion Detection system" discusses security as a paramount thing to consider in any kind of development....
11 Pages (2750 words) Report

Technology Advance and Networks Security

The integrity of a system means that whatever was entered is not altered in any way (Foltz, 2004).... The remainder delves into two broad categories of computer and network security threats: intruders and malicious software (Stallings, 2013).... Organizations nowadays are faced with the serious issue of data and assets security in as far as network security is concerned.... Organizations nowadays are faced with the serious issue of data and assets security in as far as network security is concerned....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us