Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Security Network Intrusion detection system (IDS) - Essay Example

Comments (0) Cite this document
A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Security Network Intrusion detection system (IDS)
Read TextPreview

Extract of sample "Security Network Intrusion detection system (IDS)"

Network Intrusion Detection System Introduction Intrusion detection and prevention is vital when it comes to a network’s security. A network intrusion detection system (NIDS) keeps a check on the network traffic, signals when it encounters a security breach, a malicious activity or an attack, and obstructs the source IP address from accessing the network. Below is discussed a case study and important actions which become necessary in case of network intrusion.
Case Study
If I get an alert from the IDS telling me that somebody is trying to connect repeatedly to port 3389 of my computer at and the mouse pointer starts moving by itself, I would carry out the following steps.
1) The first and foremost thing is to have a grip upon the mental approach. I would try to stay composed and relaxed rather than getting panicked. I would analyze the whole situation cool mind. Whenever a network is established, problems like these are likely to occur and companies always have a well organized solution for this. So, there is no need to get horrified.
2) Under such a situation, it becomes important to isolate the affected computer immediately. An affected machine on a network can cause all other machines on that network to be affected. I would unplug the cable and then disconnect the affected computer both from the internet and the network. This way, the intruder will not be able to have an access to the machine nor will he be able to attack other computers on the network by means of the affected one.
3) I would block the port 3389 temporarily. TCP port 3389 is the Remote Desktop Protocol (RDP) that enables a user to connect to a computer on a network. I will find out if VPN (virtual private network) had been established to protect the RDP or port 3389 traffic. I would make arrangements for the establishment of site-to-site VPN tunnel before reconnecting the computer to the network so as to secure the RDP traffic from Address Resolution Protocol (ARP) poisoning (Savill, 2008). Further investigations include: Were there passwords and sensitive information saved on the computer like ISP access passwords? These must be changed at once. How long has the intrusion gone undetected? The chances of co-computers on the network being affected increase with the time the affected one keeps on working on the network. I would investigate if the computer had updated anti-virus and desktop firewall software installed. I would make backups of all sensitive information and format the operating system. Then, I will reload the sensitive information from backup files while scanning them for viruses.
4) Whenever a security breach like this occurs, the network administrator is the first to be informed. However, it is important to inform all the operators who are dealing with the network.
5) It would be necessary to have a review of firewall and IDS logs so as to have an idea if there was a problem with firewall and IDS settings. I would see if the operating system of the affected computer hosted the firewall module station which “is a key part to securing the firewall” (Spyders Inc., 2007). I would check the IDS logs to make sure that the security needs were being met or not. I would check whether or not there was a software firewall installed on the computer in combination with a hardware firewall connected to the modem because using the combination not only blocks unwanted attacks from outside but also stops malware from getting out if the system becomes infected (DIY Online Security, 2007).
To sum up, it is very important to get the affected computer isolated from the network and then have it checked as to what caused the intrusion possible by reviewing the firewall, IDS logs and anti-virus updates, and investigation about serious concerns should be carried out.
DIY Online Security. (2007). Isolate your computer system from the internet. Basic Computer Security. Retrieved from
Savill, J. (2008, February 04). The dangers of using RDP without a VPN. WindowsIT Pro. Retrieved from
Spyders Inc. (2007). Firewalls with Application Intelligence. Security Solutions. Retrieved from Read More
Cite this document
  • APA
  • MLA
(“Security Network Intrusion detection system (IDS) Essay”, n.d.)
Security Network Intrusion detection system (IDS) Essay. Retrieved from
(Security Network Intrusion Detection System (IDS) Essay)
Security Network Intrusion Detection System (IDS) Essay.
“Security Network Intrusion Detection System (IDS) Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Network Intrusion detection system (IDS)

Analyzing and contrasting data mining based network intrusion detection system

The objective of this research is to acquire a better insight about Data Mining-Based Network Intrusion Detection Systems. In this present era the computers are sophistically connected to each other in a form of network. In such networks there is every possibility of intrusion to important data. In order to maintain the integrity, network data has to be secured. Electronic commerce (e-commerce) has made Internet usage most important part in everyone’s life and has become a major source of sending and receiving information. However, providing protection to the computers connected in a network is still a main issue to be tackled. In general, every organization wants their data to be safe and secure from the attackers. Information sy...
46 Pages(11500 words)Essay

Network Intrusion Detection and Forensics

The paper tells that computers have come to assume in all aspects of our lives, and the lack of reliable networks in modern computing environments in plainly inconceivable. The supremacy of information technology in running many modern systems hinges on the continued reliability of computer networks. Without stable computer network systems, many simple computing activities we have come to assume as part of our daily routines: sending emails, browsing the web, making business communications, and maintaining social contacts would be in severe jeopardy. Malicious use of computer networks would completely compromise our computing experience and the utilization of these indispensable network tools. Network Intrusion Detection Systems (...
26 Pages(6500 words)Dissertation

Intrusion Detection System

...Intrusion Detection System Intrusion Detection System (IDS) checks the network and its activities. It identifies any different activity and informs the administrator. Working of the system in a network and the network traffic are monitored by the Intrusion Detection system. Systems that create traffic among the network are identified and blocked. Intrusion Detection is used to manage the system and the network in a secured manner. Intrusion may occur from various sources. (Endorf 2004).IDS must be capable of identifying the security threats and prevent them from affecting the system or network. These detection systems make use of various scanning technologies to know whether a network is secured or not. An IDS has the responsibility...
14 Pages(3500 words)Essay

Network Intrusion Detection Systems

These intrusion systems have been designed using various techniques. The intrusion system designed with the help of classification technique is the popular ones as it provides more security to the systems in which it is installed. The classification technique is used to classify the type of attack the system faces. (Base 2000).The intrusion system has the responsibility of protecting the system and preventing the attacks.
According to Mun the intrusion detection system works well only if the system is selected based on the type of network. The intrusion detection system must be selected to suit the network. There are various types of networks and the system must make sure that it satisfies the network's requirements. The clas...
6 Pages(1500 words)Essay

Intrusion detection systems

...Intrusion Detection Systems IDS is the short form for the Intrusion Detection Systems. These systems basically find out the manner in which unwanted signals towards the systems are manipulated. In fact there are a host of different kinds that come under the IDS heading. Moreover, coming to the point of these manipulations which occur in the first place, we discern that these are the usual attacks that are carried out by the hackers who are skilled and quite adept at their work and even at times, script kiddies do play these tricks whereby they make use of the automated scripts to achieve their objectives. IDS thus looks at the malicious data traffic that is taking place in computer networks as well as tries its best at finding out...
8 Pages(2000 words)Essay

Wireless Intrusion Detection Systems

...Wireless Intrusion Detection Systems Introduction The numbers of organization using wireless networks are on the increase and threats to wireless networks are many and potentially disturbing. Although efforts have been made to protect these networks, the technology used is basically not certain and still very much vulnerable to active attacks and passive intrusions. Wireless networks are not only vulnerable to TCP/IP-based attacks subject to wired networks; they are as well focus to a wide range of 802.11-specific threats. For the purpose of security and detection of these possible threats, wireless networks must take up a safety measure that comprises an intrusion detection system (IDS). All organizations with wireless networks ought...
4 Pages(1000 words)Essay

Intrusion Detection

Running head: intrusion detection Intrusion Detection Affiliation September 2009 Computers are commanding tools that facilitate users to store and perform operations on huge amounts of data rapidly. Almost every organization, no matter what is size of organization, makes use of computers to manage bookkeeping, track inventory, and store documents. As organizations grow, they often need several people to enter and process data at the same time. For this to be advantageous, those people must be capable to share the data each person enters. Networking computers turns out to be advantageous in this state of affairs. Networks are merely a collection of computers linked by cable or other media so they can share information (Nash, 2000)....
2 Pages(500 words)Essay

Intrusion Detection System

.... I shall find out if upgrades had been installed and were operational. It will also be important to investigate whether VPN had been established to protect the network from getting intruded and to reduce the security breach. I shall make arrangements for the continuity of network operations like preparing redundant system and obtaining data back-ups (State of California, 2009). I shall immediately inform the system administrator and all the concerned authorities that are associated with the sensitive information saved on the affected computer, such as, the credit card company as stated above. I shall review the firewall and intrusion detection system (IDS) logs because the intrusion might have been possible due to a trouble with these. I...
2 Pages(500 words)Assignment

Intrusion Detection System

... Intrusion Detection System A system equipped to fight against firewall, malwares, and offers protection against viruses is not novice. This is because protecting the computer against these attacks is an essential part of computer management and protection policy. I agree with this argument of Justin concerning HIDS. HIDS is an intrusion detection system that screens and scrutinizes the internal parts of a computer system, and its own network interface. The system protects against attacks on the computer memory. QUESTION 2 I agree with this argument of David, since a layered defense provide security to a computing system At three different levels with the aim of preventing an attack from a virus, malwares, worms...
2 Pages(500 words)Assignment

Intrusion Detection Systems

...Intrusion detection systems Introduction Intrusion detection systems (IDS) are software application that inspects inbound and outbound network activity for suspicious activities that may show a security breach. IDS systems use all the available information in a bandwidth in order to detect intrusion. Question one IDS use its own language for analysis from lipcap data or a networking data. The unit detects signals from a network interface card which operates in separating management interface. Some IDS use a packet analyzer that operates under a command line by allowing a user to intercept the signals transmitted over a network (Kargl, 01) Question two A passive monitoring system transmits signals to the owner after a security...
2 Pages(500 words)Essay

The Relationship Between Security, Risk and Health in a Large Organisation

Managers in modern organizations tend to use appropriately customized policies – in accordance with their firms’ needs and resources (employees, funds, technology) available. The current paper focuses on the examination of the various aspects of security, risk, health and safety within large organizations; Particular emphasis is paid on the fact that the demands of each one of these factors may be differentiated under the pressure of the market conditions and the organizational priorities. The case of Shell in Nigeria has been used as an example in order to show the potential co-existence and interaction of these factors within a specific organizational environment. The measures required and the role of the security ma...
9 Pages(2250 words)Coursework

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Structure of the Educational System in Morocco and Its Capacity for Addressing the Needs of the Hospitality Industry

...Independent Research Study An investigation into the Structure of the Educational System in Morocco and its Capa for Addressing the Needs and Expectations of the Hospitality Industry in the Country Submitted by : Submitted to : Course : Date : September 29, 2009 Word Count : 3,069 words STATEMENT OF AUTHORSHIP “I confirm that no part of this work, except where clearly quoted and referenced, has been copied from material belonging to any person e.g. from a book, handout, another student. I am aware that it is a breach of GIHE regulations to copy the work of another without clear acknowledgement and that attempting to do so render me liable to disciplinary procedures.” ________________ Table of Contents I. Consultant’s Brief 4...
15 Pages(3750 words)Research Proposal

Role of the Police and Private Security

... terrorism. Hence understanding the criminal justice system is extremely important so that it may be implemented effectively and impartially. Hence, this report will also cover the following areas namely, the three levels of law enforcement in United States, the interaction between those agencies, the role of the police and private security personnel in homeland security, the role of this group in intelligence gathering and federal funding. Three levels of law enforcement: The three levels of law enforcement in the United States cover national, state and local security. This task of homeland security is the responsibility of the Federal Bureau of Investigation (FBI), the state police forces, and the local police force. Each of them has...
8 Pages(2000 words)Case Study

Examination of the Thyroid System

In 2006, his gallbladder was removed. He takes over-the-counter anti-histamines, as needed for allergic rhinitis symptoms.
Personal and Social History: Mr. "S" is a 73-year-old widower who usually eats the organic food produced from the animals and the fruits and vegetables on his farm. He has two to three beers in the evening after dinner every night. He weighs 235 lbs and measures 5 10" tall.

Whether there is any family history of swelling in the limbs? Is the swelling present anywhere else other than the lower leg? What precipitates the shortness of breath and how long does it last? Is the shortness of breath severe? How long does he need to rest to overcome the shortness of breath? Does he feel dizzy when his b...
9 Pages(2250 words)Case Study

Economic Models: The Free Market and The State Owned System

The free market concept is mainly a theoretical concept as every country, even capitalist ones place some restrictions on the ownership and exchange of commodities (Free market economy). Therefore, the term free-market economy primarily means a system where the buyers and sellers are solely responsible for the choices they make. It gives the buyers and sellers the power to do business without being afraid of any regulations and intervention by the state. Hence, a free market gives the absolute power to prices to determine the allocation and distribution of goods and services (Free Market Economy). The pricing mechanism is in turn, driven by the forces of demand and supply of goods and services. Demand and supply of...
9 Pages(2250 words)Case Study

Logistics System Management

The logistics system is designed in such a manner as the combination of various facilities in the transportation at home, and the operations involved in the warehouse and the distribution channels for the manufacturing are the same. The supply chain is a collection of various complicated systems of logistics where they have a collection of raw materials and goods that are useful for the manufacturing of the final product and to the final distributors. “For example, in make-to-assembly (MTA) systems components and semi-finished products are manufactured in a push-based manner while the final assembly stage is pull-based. Hence, the work-in-process inventory at the end of the first stage is used to assemble the finished produc...
15 Pages(3750 words)Coursework

Key Problems of Incentive System implemented at Rainbarrel

Hiram Phillips at Rainbarrel Products also implemented a Performance Management System that although resulted in significant cost reductions and cost efficiency, yet it resulted in some severe setbacks that destroyed overall efficiency. Some key customers were dissatisfied with the behavior of workers at different Rainbarrel departments as well as interdepartmental conflicts/disputes had been observed. (Daft, 2009)

The very first problem with the Incentive System was the dismissal of 10% of employees from all the departments at Rainbarrel. As a result, Rainbarrel also lost some of its best employees that were employed and servicing in top-performing departments. Most of the workers that were laid off were of low managem...
7 Pages(1750 words)Assignment

Management Information System of Linux

As emphasized by GB direct (n.d.) “one of the principal reasons for the growth of open-source software is its affinity with this business model” (par. 8). The support applications specifically come in the form of “helpdesk advice and diagnostic research and direct intervention to diagnose and resolve problems” (GB direct, n.d., par. 24).

The helpdesk application of open source software “backs-up and extends in-house resources when they are approaching their limits” (GB direct, n.d., par. 26). Even unskilled staff or personnel without any technical knowledge of software applications are assisted by the program to back-up relevant files. This support mechanism of open-source software ca...
6 Pages(1500 words)Assignment

Features of Juvenile Justice System

Each of the members shall, thus, introduce themselves in terms of their educational background and personal experiences for familiarity purposes. Let us begin with Mr. Colbert.
Colbert: I work at Quad Enterprises in the HRM department as the chief manager. I am overly concerned with the current juvenile justice system, bearing in mind that numerous people have debated upon it since time immemorial. I take a categorical interest in this issue since I have been a victim of juvenile violence. My opinion regarding the current trends in this law field is nobly affirmative. The current juvenile system is perfect. Thank you.
Amanda: I currently am a Law lecturer at a University. I am extremely interested in this issue too. My e...
7 Pages(1750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Security Network Intrusion detection system (IDS) for FREE!

Contact Us