What is an intrusion detection system

Assignment Help Software Engineering
Reference no: EM132173324

Review this article with 2 APA format references.

Intrusion Detection System Comparison NIDS and HIDS Basic Concepts A network-based Intrusion Detection System (NIDS) is placed behind a firewall within a LAN to observe and report on suspicious network activity.

NIDSs can only monitor inbound and outbound traffic on the LAN, and does not attempt to stop any activity, only recording suspicious behavior (Paloalto Networks, 2018). NIDSs are connected to the network via a network interface such as an Ethernet adapter so that it can observe network packets traversing the entire network (Paloalto Networks, 2018).

A host-based Intrusion Detection System (HIDS) is normally software based and is loaded onto a workstation or server (Ghorbani, Lu, & Tavallaee, 2010, p. 55). HIDSs only monitor traffic entering and exiting a single workstation or server (Ghorbani, Lu, & Tavallaee, 2010, p. 55). Moreover, HIDS examines host specific operations such as what applications are running, what types of files are being used, and looks at information in the kernel logs.

Both NIDSs and HIDSs incorporate rules that can be adjusted to fit the organization's needs. Selecting a broad range of rules provides the most coverage concerning possible malicious activity. However, each installation is different so adjusting the rule sets is a common practice called "tuning." An IDS, host or network-based, only reports suspicious activity and cannot block traffic (Paloalto Networks, 2018).

It is up to a security administrator to determine what is not legitimate traffic with the aid of the generated reports. If an IDS acted like its Intrusion Prevention System (IPS) counterpart, any traffic marked as being malicious could be automatically blocked (Paloalto Networks, 2018). To to the passive nature of an IDS, this can be an issue because a potentially malicious threat will not be noticed until the security administrator analyzes the data from the IDS and intervenes. Pros and Cons of HIDS and NIDS An advantage of NIDSs is centralized reporting on the network that an administrator can use to get a quick look at possible threats (Ghorbani, Lu, & Tavallaee, 2010, p. 55).

A HIDS will record information from one host and usually does not have centralized reporting. In a HIDS environment, each node must be protected separately. Data collection is somewhat problematic because each host requires configuration in order to report to a centralized control panel, if such options even exist. HIDSs used by very small businesses may not have centralized reporting as an option. One disadvantage of NIDSs is ensuring that the hardware appliance selected is capable of processing the volume of network traffic.

A failure to select the right hardware and packets will be dropped from reporting. NIDSs can send alerts to the security administrator that unusual traffic is being seen within the network as a whole. HIDSs will not send an alert until after the threat is present on the host (Saxena, n.d.).

The Book of Psalms states, "Give justice to the weak and the fatherless; maintain the right of the afflicted and the destitute. Rescue the weak and the needy; deliver them from the hand of the wicked" (Psalms 82:3-4 English Standard Version). These two verses remind each of us to defend those that may not be aware of the threats that exist in a platform that is globally connected. As security professionals, we must do our best to analyze possible threats and ensure that we protect the information critical to individuals and organizations alike.

The Book of Proverbs makes a similar calling to each of us, "Open your mouth for the mute, for the rights of all who are destitute. Open your mouth, judge righteously, defend the rights of the poor and needy" (Proverbs 31:8-9English Standard Version). References Ghorbani, A. A., Lu, W., & Tavallaee, M. (2010). Network intrusion detection and prevention:Concepts and Techniques.

What is an Intrusion Detection System.

Saxena, V. (n.d.). Description of the difference between HIDs & NIDs.

Verified Expert

A network-based Intrusion Detection System (NIDS) is placed behind a firewall within a LAN to observe and report on suspicious network activity. NIDSs can only monitor inbound and outbound traffic on the LAN, and does not attempt to stop any activity, only recording suspicious behavior. NIDSs are connected to the network via a network interface such as an Ethernet adapter so that it can observe network packets traversing the entire network. A host-based Intrusion Detection System (HIDS) is normally software based and is loaded onto a workstation or server. This paper is written in Microsoft Word Document File.

Reference no: EM132173324

Questions Cloud

What is the aim of a long straddle strategy : BEA380 Assignment - What is the aim of a long (or bottom) straddle strategy? Create a long straddle by buying a call and put with strike price K3=$22.50
Why would security analysts use password cracking tools : Why would security analysts use password cracking tools? Discuss some common tools used by security analysts.
Write a first-person description of your experiences : Imagine you are a European immigrant to America, trying to adapt to the new life you sought.
Discuss enumeration : Discuss enumeration. How to determine services that are needed and how to protect those that are not
What is an intrusion detection system : Detection System Comparison NIDS and HIDS Basic Concepts A network-based Intrusion Detection System (NIDS) is placed behind a firewall within a LAN to observe
Ap computer science a and honor computer science : Can someone recommend me some of best cloud application to practice Python/ C/ Java for high school students taking AP Computer Science A and Honor Computer
Describe the effect of western expansion : The post-Civil War South has been called the "New South." In what ways did it succeed in reinventing itself? In what ways did it fail?
Discuss how the hooks draw readers in : Draft 2 examples of narrative hooks for the introduction to a study about sports. Discuss how the hooks draw readers in, create interest in the study.
Typical usage of the modern cell phone : Can you offer a guess as to the most typical usage of the modern cell phone might be? (Hint: it isn't to make a call.)

Reviews

len2173324

11/21/2018 11:48:31 PM

i have review this article with 2 APA format references. Intrusion Detection System Comparison NIDS and HIDS Basic Concepts A network-based Intrusion Detection System (NIDS) is placed behind a firewall within a LAN to observe and report on suspicious network activity. NIDSs can only monitor inbound and outbound traffic on the LAN, The Book of Proverbs makes a similar calling to each of us, "Open your mouth for the mute, for the rights of all who are destitute. Open your mouth, judge righteously, defend the rights of the poor and needy" (Proverbs 31:8-9English Standard Version). References Ghorbani

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd