Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Intrusion Detection - Essay Example

Comments (0) Cite this document
Almost every organization, no matter what is size of organization, makes use of computers to manage bookkeeping, track inventory, and store documents. As…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Intrusion Detection
Read TextPreview

Extract of sample "Intrusion Detection"

Running head: intrusion detection Intrusion Detection Affiliation September 2009 Computers are commanding tools that facilitate users to store and perform operations on huge amounts of data rapidly. Almost every organization, no matter what is size of organization, makes use of computers to manage bookkeeping, track inventory, and store documents. As organizations grow, they often need several people to enter and process data at the same time. For this to be advantageous, those people must be capable to share the data each person enters. Networking computers turns out to be advantageous in this state of affairs. Networks are merely a collection of computers linked by cable or other media so they can share information (Nash, 2000). There are different evils also associated to these network structures also. Personal information theft, business information hacking and virus attacks are the contemporary problems organizations are facing nowadays in the network communication and data transfer areas (Frederick, 2002). Because of the rising amount of intrusions and since the local networks and Internet have turned out to be so ubiquitous, businesses more and more applying a variety of systems that monitor Information Technology security breaches (Sans, 2009).
Network Intrusion as its name represents, attempts to identify attempted or applied intrusions into network and to establish suitable actions for the intrusions. Intrusion detection includes an extensive collection of methods that differ on several axes. A few of these axes comprise: (Silberschatz, Galvin, & Gagne, 2004):
The time period that detection takes place: in real time (while it is taking place) or following the information only.
The types of input inspected to identify intrusive action. These could comprise user shell commands, process system calls, as well as network packet headers or contents. Several types of intrusions might be identified only by correlating information from various such sources.
The variety of action capabilities. Basic and straightforward types of actions consist of changing an administrator of the possible intrusion or in some way halting the potentially intrusive action, for instance, killing a course of action engaged in actually intrusive activity. In a complicated type of action, a system might clearly redirect an intruder’s action to a trap. A false resource exposed to the attacker with the aim of observing and gaining information about the attack; to the attacker, the resource appears real.
These levels of freedom in the design of space for detecting intrusions in systems have brought an extensive variety of solutions acknowledged as intrusions detection systems (IDS) (Silberschatz, Galvin, & Gagne, 2004). The accomplishment of the Intrusion detection system or IDS offers a great advantage for the detection of the possible security concerns and attacks on time and effective handling of these concerns (Sans, 2009). An Intrusion detection system or IDS is hardware and software based system to identify unwanted efforts at accessing, disabling or manipulating computer systems, mostly in the course of a network, such as the Internet. These efforts can take the shape of attacks, as examples, in the form of malware, crackers or disgruntled workers (Bradley, 2009). An intrusion detection system is also utilized to identify numerous forms of malicious behaviors that are able to compromise the security as well as trust of a computer system. This comprise network attacks besides data driven attacks on applications, vulnerable services, host based attacks like that privilege escalation, access to sensitive files, unauthorized logins and malware (for example Trojan horses, viruses, and worms) (Comptechdoc, 2009).
By seeing the importance of the intrusion detection system and its vital significance for the deployment at business and organizational areas, I have decided to work on intrusion detection and its associated aspects as a semester project. This research based project will offer a detailed analysis and examination of main areas and possible security concerns that organizations are facing in the business and organizational structures. This assessment will offer us to develop a list of main security concerns we are facing nowadays and its possible forms. The analysis of the intrusion detection will offer us the opportunity for the analysis of the main security concerns we are facing and effective handling of these security imitations. This project will provide a deep insight into the intrusion detection and detailed analytical examination of the network attacks, data driven attacks on applications, vulnerable services, host based attacks like that privilege escalation, access to sensitive files, unauthorized logins and malware (for example Trojan horses, viruses, and worms). In this way this project will completely address the main security concerns and intrusion detection techniques for the network security implementation. In this research based project I will use the authenticated academic journals, for retrieving the possible help and assistance regarding the project completion. The web based better information resources will also be incorporated in this project.
Bradley, T. (2009). Introduction to Intrusion Detection Systems (IDS). Retrieved 09 28, 2009, from
Comptechdoc. (2009). Network Intrusion Detection. Retrieved 09 28, 2009, from
Frederick, K. K. (2002). Evaluating Network Intrusion Detection Signatures, Part One. Retrieved 09 29, 2009, from
Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc.
Sans. (2009). Intrusion Detection FAQ: What is Intrusion Detection? Retrieved 09 28, 2009, from
Silberschatz, A., Galvin, P. B., & Gagne, G. (2004). Operating System Concepts (7th Edition). Wiley. Read More
Cite this document
  • APA
  • MLA
(“Intrusion Detection Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from
(Intrusion Detection Essay Example | Topics and Well Written Essays - 500 Words)
“Intrusion Detection Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Intrusion Detection

Network Intrusion Detection and Forensics

...of computer networks would completely compromise our computing experience and the utilization of these indispensable network tools. Network Intrusion Detection Systems (NIDS) are partly the reason behind the continued security in computer systems around the world. The NIDS systems detect illicit use of computer networks, alert network administrators, create reports in the system through their logging abilities, and try to prevent harm to the network by malevolent network users. However, many users of computer networks lack access to decent NIDS systems available commercially. Part of the reason why many computer users stave off the commercially available NIDS systems is the prohibitively...
26 Pages(6500 words)Dissertation

Intrusion Detection System

...of analyzing the network and system configuration. In a network, integration of system is the major component. Intrusion Detection systems have to assess the integrity of the systems within a network. Security threats may occur at anytime. Detection systems must be alert to identify and report the threats to the administrator. Several activities take place within a network. Any abnormal activity has to be analyzed by the detection system. A user will have certain limitations in accessing a network. A user policy is maintained by the organization. Each of the user's activity is recorded by the system. It tracks the user's activities and sends a report if the user...
14 Pages(3500 words)Essay

Network Intrusion Detection Systems

...of classification technique is the popular ones as it provides more security to the systems in which it is installed. The classification technique is used to classify the type of attack the system faces. (Base 2000).The intrusion system has the responsibility of protecting the system and preventing the attacks. Network intrusion systems using classification techniques are widely used and there are many articles have been written on this system. According to Mun the intrusion detection system works well only if the system is selected based on the type of network. The intrusion detection system must be selected to suit the network. There...
6 Pages(1500 words)Essay

Intrusion detection systems

... same. In certain systems, the usage of protocol based intrusion detection systems as well as that of network intrusion detection systems is made so as to look after the transport of data and also set certain protocols over the banned and illegal traffic. Similarly, acting in a host based system, the sensor normally comprises of a software agent whose main task is to discern all kinds of activities that are going on and not to forget the host’s activity on which it is located. There are a number of hybrids for such a system which include the network intrusion detection system and protocol based intrusion detection system. The network intrusion detection system looks at the working in an independent manner whereby the same is a free and open...
8 Pages(2000 words)Essay

Wireless Intrusion Detection Systems

... to think about an IDS solution. This essay is intended to explain the intrusion methods, need for wireless intrusion detection system and as well identify the rewards and problems of wireless intrusion detection systems (Farshchi, 2003). Methods of intrusion Usually, signals from wireless networks are radiated by an omni-directional aerial system beyond the proposed coverage area. Such an environment makes the physical protection of the network generally impossible. Several passive and active intrusion methods rapidly came up to exploit this weakness. In passive methods radio frequency (RF) monitoring is used. The active systems can transmit signals to inquire the status of the network and also put in malicious data into the network...
4 Pages(1000 words)Essay

Security Network Intrusion detection system (IDS)

...Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at and the mouse pointer starts moving by itself, I would carry out the following steps. 1) The first and foremost thing is to have a grip...
2 Pages(500 words)Essay

Intrusion Detection System

.... I shall find out if upgrades had been installed and were operational. It will also be important to investigate whether VPN had been established to protect the network from getting intruded and to reduce the security breach. I shall make arrangements for the continuity of network operations like preparing redundant system and obtaining data back-ups (State of California, 2009). I shall immediately inform the system administrator and all the concerned authorities that are associated with the sensitive information saved on the affected computer, such as, the credit card company as stated above. I shall review the firewall and intrusion detection system (IDS) logs because the intrusion might have been possible due to a trouble with these. I...
2 Pages(500 words)Assignment

Intrusion Detection System

... Intrusion Detection System A system equipped to fight against firewall, malwares, and offers protection against viruses is not novice. This is because protecting the computer against these attacks is an essential part of computer management and protection policy. I agree with this argument of Justin concerning HIDS. HIDS is an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory. QUESTION 2 I agree with this argument of David, since a layered defense provide security to a computing system At three different levels with the aim of preventing an attack from a virus, malwares, worms...
2 Pages(500 words)Assignment

Intrusion Detection Systems

...Intrusion detection systems Introduction Intrusion detection systems (IDS) are software application that inspects inbound and outbound network activity for suspicious activities that may show a security breach. IDS systems use all the available information in a bandwidth in order to detect intrusion. Question one IDS use its own language for analysis from lipcap data or a networking data. The unit detects signals from a network interface card which operates in separating management interface. Some IDS use a packet analyzer that operates under a command line by allowing a user to intercept the signals transmitted over a network (Kargl, 01) Question two A passive monitoring system transmits signals to the owner after a security...
2 Pages(500 words)Essay

Firewalls and Intrusion Detection Systems

...and differences of these two systems? Intrusion detection systems are software applications or devices that detects and monitors malicious activities of violations of policies provided. In addition, the application provides reports and information to management stations. The application has different ways and mechanisms that may detect network traffic from different sources. In general, intrusion detection systems focus on detecting network incidences, logging information of users and reporting log in attempts (Ross, 2001). Moreover, companies use the systems to monitor their existing security systems. This is done...
2 Pages(500 words)Assignment

ABC's Detection, Response, and Control Management

...  Detection, Response & Control - Management Perspectives and Responsibilities Executive Summary: ABC is a newly formed multi-national consulting company. ABC specializes in Management, Human Resource and Software Consultancy. In addition to the Head Office, the company has 10 global offices. The company relies on Information Technology for large part of its working. Since the company doesn’t have a long history, it has neither experienced risks nor intrusions in its networks. We analyzed the current scenarios of the company vis-à-vis incident detection, response and control and suggested cost effective ways for risk management. We carry out a discussion in light of Risk Management, Business Continuity Plan, Disaster Management...
30 Pages(7500 words)Research Proposal

Definition And Detection Of Proteinuria

The dipstick test (or the dip-and-read analysis) is the use of a specially treated strip to semi-quantitatively determine the amount of protein (mainly albumin) in a urine sample. In the absence of protein, the dipstick panel is yellow. Proteins in solution interfere with the dye indicator-buffer combination, causing the panel to turn green. Tetrabromophenol is the dye indicator that is commonly used. The buffer serves to maintain a pH of 3.0. The change in colour is independent on the pH of urine. The results are graded as negative (less than 10 mg per dL), trace (10 to 20 mg per dL), 1+ (30 mg per dL), 2+ (100 mg per dL), 3+ (300 mg per dL) or 4+ (1,000 mg per dL). This method preferentially detects albumin and is less sensitive...
6 Pages(1500 words)Case Study

Autoimmune Diseases : Biological Basis and Methods of Detection

...Autoimmune Diseases: Biological Basis and Methods of Detection and Study Introduction Autoimmune diseases are defined as “a clinical syndrome caused by the activation of T cells or B cells, or both, in the absence of an ongoing infection or other discernible cause” (Davidson & Diamond, 2001: p.345). Autoimmunity is characterized by a misdirected immune response in which the body’s defenses become self-destructive. Autoimmune diseases are not transmitted from one person to another. The process of autoimmunity is related to genes or a combination of genes, hormones, and environmental stimuli. Individuals with specific genes or gene combinations are at a higher risk for developing autoimmune disorders which may be triggered by outside stimuli...
9 Pages(2250 words)Coursework

Breast Cancer Screening, Detection and Classification

Collagen alpha 1 and 2 families had the most number of tryptic peptides, while several of the other proteins showed only one tryptic peptide each. Most of the proteins identified have been reported to be involved in tumor progression and metastasis. Their roles were in chromatin modeling, transcriptional and translational regulation. Results of the study showed that deploying MALDI-IMS-MS on breast cancer tissue microarray was successful in identifying proteins involved in cancer progression, and have potential use in the molecular and proteome-based classification of breast cancer types.
Breast cancer is the most common cancer in women, with 1.4 million new cases in 2008 alone. Currently, it is the most common cancer in devel...
28 Pages(7000 words)Research Paper

Prostate Cancer Concerns about Screening in Early Detection

...Prostate Cancer Concerns about Screening in Early Detection Introduction Prostate cancer is only found in men and constitutes by far the commonest form of cancer in men across the borders. The reason why the cancer affects men only is due to the fact that it affects the prostate gland that is only found in the male reproductive system. This form of cancer is malignant and can spread to other parts of the body if early detection and intervention are not facilitated in time to arrest the tumor. Spreading to other tissues usually happens at an advanced stage, creating an intervention opportunity for patients who seek medical attention. Generally, about nine in ten cases of the cancer are dormant and lack of marked disturbances largely...
6 Pages(1500 words)Research Paper

Screening for Early detection of Colorectal Cancer

...Screening for early detection of Colorectal Cancer Among Americans Colorectal cancer is the 4th commonest type and it is capable of being cured if caught in the early stages. In Canada it is the second most fatal type of cancer ( Colon Cancer Check, Ontario, January 2011) It begins with the growth of small polyps which can bleed and which in time can both cause cancer and narrowing of the lumen. The cancers can also spread to other parts of the body. The incidence of the condition rises after the age of 50. Dr Dennis Lee (1996) lists a number of possible causes. These include family history, a high fat diet and a history of ulcerative colitis. Lee states that it is thought that the breakdown of fats in the intestine produces carcinogens...
6 Pages(1500 words)Research Paper

Organized Crime and Detection: Finding and Maximizing Criminal Data

...Organized Crime and Detection: Finding and Maximizing Criminal Data ABSTRACT: Organized crime and terrorist activity in the Computer Age takes place on multiple levels, in both the virtual and physical worlds. Preventing criminal activity in the modern era requires the gathering, coordination, analysis and interpretation of massive amounts of data. Law enforcement has advanced database technologies and computer software analysis programs designed to work in concert with more traditional detection tools. In order to safeguard America’s economic integrity and physical safety, it is necessary to continue developing robust information technologies. The classic image of fedora-wearing agents breaking in on clandestine organized crime...
11 Pages(2750 words)Research Paper

Virus Detection Software

... Virus Detection Software Introduction In definition, viruses refer to specific programs that people deliberately make, to get in the way of system documentation and functionality, therefore, doing away with important information stored in the system for different uses. Virus detection softwares play critical role in enhancing the safety of computer systems and by so doing safeguarding information contained. This is a creative paper, which precisely presents appropriate discussions on the issues pertaining to virus detection software from a wide perspective. In terms of discussions, the paper starts by giving a discussion on architecture of modern computer networks. It then addresses network security, reliability, finally network...
12 Pages(3000 words)Research Paper

Polygraphs Roles in Detection Physically and Mentally on Suspects

...Polygraphs’ Roles in Detection Physically and Mentally on Suspects The Polygraph also referred as a lie detector is used in various dispensations in order to detect and unravel hidden information on a suspect in order to offer the truth regarding a particular agenda. The following exposition will espouse various roles of polygraph on suspects. In United States, the polygraph is used in the criminal investigation whereby the examiner unravels the truth regarding especial crimes that do not have the eye wittiness. Criminal acts such as sexual assault may occur without the eye wittiness, thus becoming difficult to justify the crime in a court of law. Victims of sexual assault may not be able to justify the events that led to the assault thus...
5 Pages(1250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Intrusion Detection for FREE!

Contact Us