Free

Intrusion Detection - Essay Example

Comments (0) Cite this document
Summary
Almost every organization, no matter what is size of organization, makes use of computers to manage bookkeeping, track inventory, and store documents. As…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Intrusion Detection
Read TextPreview

Extract of sample "Intrusion Detection"

Running head: intrusion detection Intrusion Detection Affiliation September 2009 Computers are commanding tools that facilitate users to store and perform operations on huge amounts of data rapidly. Almost every organization, no matter what is size of organization, makes use of computers to manage bookkeeping, track inventory, and store documents. As organizations grow, they often need several people to enter and process data at the same time. For this to be advantageous, those people must be capable to share the data each person enters. Networking computers turns out to be advantageous in this state of affairs. Networks are merely a collection of computers linked by cable or other media so they can share information (Nash, 2000). There are different evils also associated to these network structures also. Personal information theft, business information hacking and virus attacks are the contemporary problems organizations are facing nowadays in the network communication and data transfer areas (Frederick, 2002). Because of the rising amount of intrusions and since the local networks and Internet have turned out to be so ubiquitous, businesses more and more applying a variety of systems that monitor Information Technology security breaches (Sans, 2009).
Network Intrusion as its name represents, attempts to identify attempted or applied intrusions into network and to establish suitable actions for the intrusions. Intrusion detection includes an extensive collection of methods that differ on several axes. A few of these axes comprise: (Silberschatz, Galvin, & Gagne, 2004):
The time period that detection takes place: in real time (while it is taking place) or following the information only.
The types of input inspected to identify intrusive action. These could comprise user shell commands, process system calls, as well as network packet headers or contents. Several types of intrusions might be identified only by correlating information from various such sources.
The variety of action capabilities. Basic and straightforward types of actions consist of changing an administrator of the possible intrusion or in some way halting the potentially intrusive action, for instance, killing a course of action engaged in actually intrusive activity. In a complicated type of action, a system might clearly redirect an intruder’s action to a trap. A false resource exposed to the attacker with the aim of observing and gaining information about the attack; to the attacker, the resource appears real.
These levels of freedom in the design of space for detecting intrusions in systems have brought an extensive variety of solutions acknowledged as intrusions detection systems (IDS) (Silberschatz, Galvin, & Gagne, 2004). The accomplishment of the Intrusion detection system or IDS offers a great advantage for the detection of the possible security concerns and attacks on time and effective handling of these concerns (Sans, 2009). An Intrusion detection system or IDS is hardware and software based system to identify unwanted efforts at accessing, disabling or manipulating computer systems, mostly in the course of a network, such as the Internet. These efforts can take the shape of attacks, as examples, in the form of malware, crackers or disgruntled workers (Bradley, 2009). An intrusion detection system is also utilized to identify numerous forms of malicious behaviors that are able to compromise the security as well as trust of a computer system. This comprise network attacks besides data driven attacks on applications, vulnerable services, host based attacks like that privilege escalation, access to sensitive files, unauthorized logins and malware (for example Trojan horses, viruses, and worms) (Comptechdoc, 2009).
By seeing the importance of the intrusion detection system and its vital significance for the deployment at business and organizational areas, I have decided to work on intrusion detection and its associated aspects as a semester project. This research based project will offer a detailed analysis and examination of main areas and possible security concerns that organizations are facing in the business and organizational structures. This assessment will offer us to develop a list of main security concerns we are facing nowadays and its possible forms. The analysis of the intrusion detection will offer us the opportunity for the analysis of the main security concerns we are facing and effective handling of these security imitations. This project will provide a deep insight into the intrusion detection and detailed analytical examination of the network attacks, data driven attacks on applications, vulnerable services, host based attacks like that privilege escalation, access to sensitive files, unauthorized logins and malware (for example Trojan horses, viruses, and worms). In this way this project will completely address the main security concerns and intrusion detection techniques for the network security implementation. In this research based project I will use the authenticated academic journals, for retrieving the possible help and assistance regarding the project completion. The web based better information resources will also be incorporated in this project.
References
Bradley, T. (2009). Introduction to Intrusion Detection Systems (IDS). Retrieved 09 28, 2009, from http://netsecurity.about.com/cs/hackertools/a/aa030504.htm
Comptechdoc. (2009). Network Intrusion Detection. Retrieved 09 28, 2009, from http://www.comptechdoc.org/independent/security/recommendations/secintdet.html
Frederick, K. K. (2002). Evaluating Network Intrusion Detection Signatures, Part One. Retrieved 09 29, 2009, from http://www.securityfocus.com/infocus/1623
Nash, J. (2000). Networking Essentials, MCSE Study Guide. California: IDG Books Worldwide, Inc.
Sans. (2009). Intrusion Detection FAQ: What is Intrusion Detection? Retrieved 09 28, 2009, from http://www.sans.org/resources/idfaq/what_is_id.php
Silberschatz, A., Galvin, P. B., & Gagne, G. (2004). Operating System Concepts (7th Edition). Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Intrusion Detection Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1557885-intrusion-detection
(Intrusion Detection Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1557885-intrusion-detection.
“Intrusion Detection Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1557885-intrusion-detection.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Intrusion Detection

Network Intrusion Detection and Forensics

...? Project Network Intrusion Detection and Forensics Project Aims: Compare and Contrast two or more of a widely used Open Source Network Intrusion Detection Systems (NIDS): Snort and Bro Abstract Computers have come to assume in all aspects of our lives, and the lack of reliable networks in modern computing environments in plainly inconceivable. The supremacy of information technology in running many modern systems hinges on the continued reliability of computer networks. Without stable computer network systems, many simple computing activities we have come to assume as part of our daily routines: sending emails, browsing the web, making business communications, and...
26 Pages(6500 words)Dissertation

Intrusion Detection System

...Intrusion Detection System Intrusion Detection System (IDS) checks the network and its activities. It identifies any different activity and informs the administrator. Working of the system in a network and the network traffic are monitored by the Intrusion Detection system. Systems that create traffic among the network are identified and blocked. Intrusion Detection is used to manage the system and the network in a secured manner. Intrusion may occur from various sources. (Endorf 2004).IDS must be capable of identifying the security threats and prevent them from affecting the system or...
14 Pages(3500 words)Essay

Network Intrusion Detection Systems

...Network Intrusion Detection systems Introduction Network Intrusion Detection systems are widely used andthey are one of the major component in a network. These systems help to prevent the intrusion and attacks by using a unique mechanism. Intrusion detection system detects and protects the network system from threats and attacks. It is the most important component of the network system. It is mandatory for the network systems to install an intrusion detection system to easily manage the attacks and resolve the issues. (Mun 2009). There are various types of...
6 Pages(1500 words)Essay

Intrusion detection systems

...Intrusion Detection Systems IDS is the short form for the Intrusion Detection Systems. These systems basically find out the manner in which unwanted signals towards the systems are manipulated. In fact there are a host of different kinds that come under the IDS heading. Moreover, coming to the point of these manipulations which occur in the first place, we discern that these are the usual attacks that are carried out by the hackers who are skilled and quite adept at their work and even at times, script kiddies do play these tricks whereby they make use of the automated scripts to achieve their objectives. IDS thus looks at the malicious data traffic that is taking place in computer networks as well as tries its best at finding out... same....
8 Pages(2000 words)Essay

Wireless Intrusion Detection Systems

...Wireless Intrusion Detection Systems Introduction The numbers of organization using wireless networks are on the increase and threats to wireless networks are many and potentially disturbing. Although efforts have been made to protect these networks, the technology used is basically not certain and still very much vulnerable to active attacks and passive intrusions. Wireless networks are not only vulnerable to TCP/IP-based attacks subject to wired networks; they are as well focus to a wide range of 802.11-specific threats. For the purpose of security and detection of these possible threats, wireless networks must take up a safety measure that comprises an...
4 Pages(1000 words)Essay

Security Network Intrusion detection system (IDS)

...Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion. Case Study If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at 192.168.2.124 and the mouse...
2 Pages(500 words)Essay

Intrusion Detection System

...Intrusion Detection System Introduction It is very important to keep track of all possible intrusions that a sensitive network might encounter (thesis statement). This can be done by keeping a strict check on proper configuration, management and monitoring of the firewall settings, intrusion detection system’s logs and anti-virus upgrades. A case study has been discussed here which involves a scenario where an intruder attacked port 3389 of a computer. Necessary Actions According to the case study given, the intrusion will drive me to take these actions: I shall tell myself to relax. Fright worsens the whole situation. One can think...
2 Pages(500 words)Assignment

Intrusion Detection System

... Intrusion Detection System A system equipped to fight against firewall, malwares, and offers protection against viruses is not novice. This is because protecting the computer against these attacks is an essential part of computer management and protection policy. I agree with this argument of Justin concerning HIDS. HIDS is an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory. QUESTION 2 I agree with this argument of David, since a layered defense provide security to a computing system At three different levels...
2 Pages(500 words)Assignment

Intrusion Detection Systems

A passive monitoring system transmits signals to the owner after a security breach by utilizing a sensor that detects any weird movement. The main advantage of a passive monitoring system is that the units can be deployed randomly minimizing the device attacks. Passive monitoring IDS cannot block suspicious signals on their own; an operator has to be available to block any potential threat. For Inline transmission, the IDS does not transmit signals to the owner rather it auto-responds to the malicious activity by reconstructing the connection to block communication from the suspicious source. The system is configured to automatically alter suspicious signals without any operation by the owner. Inline transmission IDS can block den...
2 Pages(500 words)Essay

Firewalls and Intrusion Detection Systems

...Firewalls and intrusion detection systems affiliation Firewalls and intrusion detection systems The modern IT systems require effective protection system that may prevent distortion and poor security measures. With an increase in the indulgence in IT systems, security hitches have increased. For instance, hacking cases have increased significantly. For this reason, security measures and systems have been developed to ensure IT systems are secured. St. Louis IT Company (2014) is of the assumption that security systems have become a mandatory requirement considering the vulnerable nature of IT systems. In an example, Firewalls and intrusion detection systems are created to address network security cases. What are the similarities... and...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Intrusion Detection for FREE!

Contact Us