Preview

Nids

Powerful Essays
Open Document
Open Document
2445 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nids
“Network intrusion detection system (NIDS) is an independent platform that identifies intrusions by examining network traffic and monitors multiple hosts. Network intrusion detection systems gain access to network traffic by connecting to a network router, network switch configured for port mirroring, or network tap.”

Akhila Isuranga
44172

Content
1. Overview 1.1 What is Internet Security? 1.2 Intruder
2. Network intrusion detection system (NIDS) 2.1Signature base detection 2.2 Anomaly detection base
3. Architecture of NIDS 3.1Component of NIDS 3.2 Sensor placement in NIDS
4. Traffic controlling of a network
5. DMZ – Demilitarized zone.
6. Snort 6.1 What’s snort? 6.2 Architecture of Snort 6.3 Rules content 6.4 Snort download and installation 6.5 Snort configuration 6.6 Traffic capturing

7. Vulnerabilities and Attacks vs. NIDS
8. Capabilities of NIDS monitoring:
9. Disadvantages of NIDS
10. References

1. Overview

1.1 What is Internet Security?
In today’s environment we need to contact each other through networks. Most of the devices or networks are interconnect to other devices or networks. As a result of this connection you are able to share your files, documents, etc. but when you are sharing you need to connect to a network and to the internet. When you connect to the internet you are taking a risk, cause your sharing files or documents may visible to others or intruders can steel your important files without a leaving a single mark. As a result of this Internet Security was introduced to protect your system from intruders.

1.2 Intruder
Intruder is a person who is trying to connect to your network without your prior permission. There are two types of intruders. * Insider – insider is the most dangerous type of intruder. This person is who has a permission to enter your network. Most insiders are trying to mischief or steel your files. It

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Determination of Khp

    • 907 Words
    • 4 Pages

    For determining purity of unknown KHP, acid – base titration was used. Molarity of titrant in this case NaOH was standardized as 0.04958(±0.00011) M. Purity of unknown KHP was calculated as 35.88(±0.16) %.…

    • 907 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    What are the major security threats on my network and computers connected to the network?…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Better Essays

    * IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    People will always be tempted to go onto the network and to browse the web on their own. Employees can dowload music or videos and possibly games which hand affect the security contols sometimes when those who don’t have authorized access to the network, they will continuously try to attempt to connect. Its best to notify anyone who is authorized on the network to know that there is an unauthorized attempt to log in. there are created policies that are made just to inform employees of risk managing and prevention. Notify are very important to the workstation. All employees must be able to know when there is authentication failure. Viewing log files can show all the security events which allow an administrator to check into it and find he root causes.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 - Info Sec

    • 2576 Words
    • 10 Pages

    Anytime a user attempts to access a network, the server logs the attempt. In this lab, you first used the…

    • 2576 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Insiders have caused damage to networks being terminated or remain in a position to provide information to the outside. They can set up fake websites that look like a real product or supplier but are actually malicious sites designed to attack the computer and add malicious code to the key log, use contact lists, steal data, and other malicious purposes.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    a. Unauthorized access from public internet – Operating system, software patches, updates, change passwords often, and hardware or software firewall.…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Prison gangs are responsible for a lot of violence in the prison system. Prison gangs take responsibility for mostly all the illegal doing in the penitentiary they are sentenced to be in. There are various types of gangs in the prison system such as: Aryan Brotherhood, Black Guerilla Family, La Neustra Familia, Mexican Mafia, Neta, Texas Syndicate, New Mexico Syndicate, Nazi Low Riders, Azteca, Dirty White Boys, Los Solidos, Texas Mafia, Tri-City Bombers, Bulldog Nation, Border Brothers, Aryan Circle, Mandingo Warriors, Barrio Azteca, Hermanos de Pistoleros Latinos, Mexikanemi, Partido Revolucionario Mexicano, Peckerwoods, Raza Unida, Tango Blast, Texas Chicano Brotherhood, White Knights, ect… ; It is a never ending list. Now as you may know…

    • 146 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    1. When selecting a UPL the Commander must take into consideration which of the following qualifications? The commander appoints an officer or non-commisned officer ( e-5 r above) on orders as the UPL…

    • 3727 Words
    • 15 Pages
    Satisfactory Essays
  • Satisfactory Essays

    hackers

    • 377 Words
    • 2 Pages

    White Hat Hackers- These are Hackers that try to break into systems in order to help a company/corporation find the weaknesses in their system. They have no malicious intent and they are used to deter black hat hackers.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays