Deployment and implementing of an ids, Computer Network Security

DEPLOYMENT AND IMPLEMENTING OF AN IDS

The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to install, configure, and monitors IDS, workstations management, the size of the storage required for retention of the data which is generated by the systems.

IDS Control Strategies


IDS can be implemented by means of one of three basic control strategies

-Centralized: all the IDS control functions are implemented and managed in a central location which is shown in Figure given below.

-Fully distributed: all control functions are applied at the physical location of each IDS component that is shown in Figure A given below.

-Partially distributed: combines two; while individual agents can analyze and respond to local threats, they report to hierarchical central facility to enable organization to detect widespread attacks that is shown in Figure B given below.

 

 

                                        2098_DEPLOYMENT AND IMPLEMENTING OF AN IDS.png

                                                                   Figure A--Centralized IDS controls

                                      1379_Fully distributed.png

                                                            Figure B--Fully Distributed IDS system

 

 

                                          1242_Partially distributed.png

                                                             Figure C--Partially Distributed IDS system

Posted Date: 10/9/2012 3:54:59 AM | Location : United States







Related Discussions:- Deployment and implementing of an ids, Assignment Help, Ask Question on Deployment and implementing of an ids, Get Answer, Expert's Help, Deployment and implementing of an ids Discussions

Write discussion on Deployment and implementing of an ids
Your posts are moderated
Related Questions
All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that


'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

(a) Show four Network Security attacks. How do they compromise security? (b) In what ways do the following devices or services contribute to security: (i) Firewall (ii) In

SDES encryption and decryption

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o