Deployment and implementing of an ids, Computer Network Security


The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to install, configure, and monitors IDS, workstations management, the size of the storage required for retention of the data which is generated by the systems.

IDS Control Strategies

IDS can be implemented by means of one of three basic control strategies

-Centralized: all the IDS control functions are implemented and managed in a central location which is shown in Figure given below.

-Fully distributed: all control functions are applied at the physical location of each IDS component that is shown in Figure A given below.

-Partially distributed: combines two; while individual agents can analyze and respond to local threats, they report to hierarchical central facility to enable organization to detect widespread attacks that is shown in Figure B given below.



                                        2098_DEPLOYMENT AND IMPLEMENTING OF AN IDS.png

                                                                   Figure A--Centralized IDS controls

                                      1379_Fully distributed.png

                                                            Figure B--Fully Distributed IDS system



                                          1242_Partially distributed.png

                                                             Figure C--Partially Distributed IDS system

Posted Date: 10/9/2012 3:54:59 AM | Location : United States

Related Discussions:- Deployment and implementing of an ids, Assignment Help, Ask Question on Deployment and implementing of an ids, Get Answer, Expert's Help, Deployment and implementing of an ids Discussions

Write discussion on Deployment and implementing of an ids
Your posts are moderated
Related Questions
Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Problem : (a) Provide one possible classification of PCA, ART, RBF, and Fuzzy ARTMAP networks. (b) Describe in detail the characteristics of Radial Basis Function Neural Net

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

POLICY MANAGEMENT Policies should be managed as they constantly change. Good policy development and maintenance make a more resilient organization. All policies undergo tremendou

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th