Deployment and implementing of an ids, Computer Network Security

DEPLOYMENT AND IMPLEMENTING OF AN IDS

The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to install, configure, and monitors IDS, workstations management, the size of the storage required for retention of the data which is generated by the systems.

IDS Control Strategies


IDS can be implemented by means of one of three basic control strategies

-Centralized: all the IDS control functions are implemented and managed in a central location which is shown in Figure given below.

-Fully distributed: all control functions are applied at the physical location of each IDS component that is shown in Figure A given below.

-Partially distributed: combines two; while individual agents can analyze and respond to local threats, they report to hierarchical central facility to enable organization to detect widespread attacks that is shown in Figure B given below.

 

 

                                        2098_DEPLOYMENT AND IMPLEMENTING OF AN IDS.png

                                                                   Figure A--Centralized IDS controls

                                      1379_Fully distributed.png

                                                            Figure B--Fully Distributed IDS system

 

 

                                          1242_Partially distributed.png

                                                             Figure C--Partially Distributed IDS system

Posted Date: 10/9/2012 3:54:59 AM | Location : United States







Related Discussions:- Deployment and implementing of an ids, Assignment Help, Ask Question on Deployment and implementing of an ids, Get Answer, Expert's Help, Deployment and implementing of an ids Discussions

Write discussion on Deployment and implementing of an ids
Your posts are moderated
Related Questions
What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

BALANCING SECURITY AND ACCESS Even with best planning and implementation, it is impossible to obtain perfect security, that is, it is a process, not an absolute. Security should

Question: a) Name a method to allow a person to send a confidential email to another person, without risks of a third-party reading the email. Describe briefly the operations

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

In 10 or more pages, address the following topics (be sure to use diagrams as well as references). 1) Define broadband and baseband transmission technology. 2) Describe broadban

The three primary types of network protection are the same as the three primary areas where a network can be attacked. Every network needs protection against people-related, hardwa

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

What is information security Information security protects information (and facilities and systems which store, use and transmit it) from a broad range of threats, in order to p

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.