Sign In
Not register? Register Now!
You are here: HomeEssayTechnology
Pages:
2 pages/≈550 words
Sources:
Level:
MLA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 12.15
Topic:

Intrusion Detection Systems (Essay Sample)

Instructions:
Content:

Student’s Name:
Tutor’s Name:
Course:
Date Due:
Intrusion Detection Systems
Introduction
Intrusion detection systems (IDS) are software application that inspects inbound and outbound network activity for suspicious activities that may show a security breach. IDS systems use all the available information in a bandwidth in order to detect intrusion.
Question one
IDS use its own language for analysis from lipcap data or a networking data. The unit detects signals from a network interface card which operates in separating management interface. Some IDS use a packet analyzer that operates under a command line by allowing a user to intercept the signals transmitted over a network (Kargl, 01)
Question two
A passive monitoring system transmits signals to the owner after a security breach by utilizing a sensor that detects any weird movement. The main advantage of a passive monitoring systems is that the units can be deployed randomly minimizing the device attacks. Passive monitoring IDS cannot block suspicious signals on their own; an operator has to be available to block any potential threat.
For Inline transmission, the IDS does not transmit signals to the owner rather it auto responds to the malicious activity by reconstructing the connection to block communication from the suspicious source. The system is configured to automatically alter supicious signals without any operation by the owner. Inline transmission IDS can block denial of service attack by flooding a system which ends up reducing frequency transmission bandwidth.
The disadvantage of the inline transmission is that it has to be placed in line along a network path making it susceptible to damage. The other Inline transmission shortcoming is that the device cannot analyze if a breach was a false or legitimate. Authorized users may be denied access to a premise if the alarm has not been keenly identified.
Question three
Thresholds are used with IDS alerts because they add an extra advantage to the IDS in detecting any intrusion by identifying an attack in a short duration. The early detection can help the administrator to take a quick action in controlling the next breach.
Question four
Most IDS deployments do not work as expected because they utilize pattern matching to detect intrusion. If an attacker changes the pattern evasion, it may be possible to avoid detection.
Question five
Number of simultaneous connections should be considered before implementing IDS. The system sensors are usually limited to the number of connections for which they can detect. Maintenance cost should also...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • How Does Internet Influence Society Nowadays
    Description: Founded over five decades ago and gained super recognition in the late 1990's, the internet is now the greatest human discovery...
    2 pages/≈550 words| MLA | Technology | Essay |
  • Alternative Fuel
    Description: Fuel has been part and parcel of the evolution of both man and machine. According to Darwinism, the first source of fuel or energy was fire discovered by the early man...
    7 pages/≈1925 words| MLA | Technology | Essay |
  • University of Maryland (Proposal)
    Description: University of Maryland (UMD) has been noted as a city because it is one of the largest campus in the country...
    5 pages/≈1375 words| 3 Sources | MLA | Technology | Essay |
Need a Custom Essay Written?
First time 15% Discount!