Deployment and implementing of an ids, Computer Network Security

DEPLOYMENT AND IMPLEMENTING OF AN IDS

The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to install, configure, and monitors IDS, workstations management, the size of the storage required for retention of the data which is generated by the systems.

IDS Control Strategies


IDS can be implemented by means of one of three basic control strategies

-Centralized: all the IDS control functions are implemented and managed in a central location which is shown in Figure given below.

-Fully distributed: all control functions are applied at the physical location of each IDS component that is shown in Figure A given below.

-Partially distributed: combines two; while individual agents can analyze and respond to local threats, they report to hierarchical central facility to enable organization to detect widespread attacks that is shown in Figure B given below.

 

 

                                        2098_DEPLOYMENT AND IMPLEMENTING OF AN IDS.png

                                                                   Figure A--Centralized IDS controls

                                      1379_Fully distributed.png

                                                            Figure B--Fully Distributed IDS system

 

 

                                          1242_Partially distributed.png

                                                             Figure C--Partially Distributed IDS system

Posted Date: 10/9/2012 3:54:59 AM | Location : United States







Related Discussions:- Deployment and implementing of an ids, Assignment Help, Ask Question on Deployment and implementing of an ids, Get Answer, Expert's Help, Deployment and implementing of an ids Discussions

Write discussion on Deployment and implementing of an ids
Your posts are moderated
Related Questions
QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

RING TOPOLOGY In this topology of network the devices are connected to each other in packed loop. In this network first computer passes data packet to the second and then seco

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.