Preview

Factors Hindering Database Security

Satisfactory Essays
Open Document
Open Document
3306 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Factors Hindering Database Security
Research Proposal Intrusion Detection in Distributed Multimedia Applications
Regina Awor Komakec (s0535273) March 31, 2007

1

Contents
1 Introduction 2 Background 2.1 Approaches to Intrusion Detection . . . . . . . . . . . . . . . 2.2 General Model of Intrusion Detection System (IDS) . . . . . 2.3 Types of Intrusion Detection Systems . . . . . . . . . . . . . 2.3.1 Network Layer Intrusion Detection . . . . . . . . . . . 2.3.2 Application Layer Intrusion Detection . . . . . . . . . 2.4 Network Layer and/or Application Layer Intrusion Detection 1 2 2 3 3 4 4 4 5 5 5 6 6 6 7 7 9 9 9

. . . . . .

. . . . . .

3 Research Question 3.1 Sub-Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Relevance of Research 5 Research Methods 5.1 Proposed Case Study: Distributed Multimedia Applications . . . 5.1.1 Teleconferencing . . . . . . . . . . . . . . . . . . . . . . . 5.1.2 Intrusion Detection and Teleconferencing . . . . . . . . . 6 Work Plan Appendices A Intrusion Detection (ID) Models A.1 Denning’s (1986) Intrusion Detection IDES Model . . . . . . . .

B Ideas for Applications To Study 10 B.1 Information Management . . . . . . . . . . . . . . . . . . . . . . 10 B.2 Web Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 B.3 Identity Management . . . . . . . . . . . . . . . . . . . . . . . . . 10

1

Introduction

The current trend is that it is becoming increasingly easier to attack computer systems. More people with limited computer knowledge (script kiddies) can carry out attack on poorly maintained systems, because attack tools are increasingly accessible and usable. A manifestation of this is the movement of attack tools from command-line to graphical-based tools. The Iris Network Traffic Analyzer (formally known as SpyNet) [5], for example, is a GUI (Graphical User Interface), packet sniffing tool. Information system security is important in this computer age. It goes without saying that information management is



References: [1] S. Axelsson. Intrusion detection: A survey and taxonomy. PDF document, 2000. http://www.cs.plu.edu/courses/CompSec/arts/taxonomy.pdf. 8 vacy, page 0120, 1999 Several intrusion detection models have been suggested. Denning’s (1986) IDES model forms the basis for several intrusion detection systems. Other approaches involve the use of agents for intrusion detection (Asaka, et al., 1999). A.1 Denning’s (1986) Intrusion Detection IDES Model

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Implementing the installation of an IDS or IPS will allow for suspicious traffic to be flagged and reported to administrators based on one of two different factors. These factors are signature based or anomaly based depending on how they are configured.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    An automated response approach, in contrast, provides immediate response to detected incidents without human intervention. An automated response essentially addresses the shortcomings of a notification and manual response approach by mitigating the vulnerability between detecting and responding. Although notification and manual responses are inadequate due to its inability to address attacks in real time, there are still drawbacks for the automated response approach. The complications prevalent to the automated response approach includes false…

    • 107 Words
    • 1 Page
    Good Essays
  • Better Essays

    Hardware can be used to protect the network from outside threats. Intrusion detection systems (IDS) automate detection of threats and attack through traffic analysis. Cisco’s IDS “delivers a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, along with bandwidth and e-Business application attacks” (Cisco Systems, 2007, Cisco Intrusion Detection). They take this one-step further with an intrusion prevention systems (IPS). IPS shifts the focus on the attacker, not the attack itself, by increasing the accuracy of threat prevention through global threat analysis (Cisco Systems, 2012, Intrusion Prevention System with Global Correlation). The Cisco Adaptive Security Appliances (ASA) “combines the industry 's most deployed stateful inspection firewall with…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 6 Types of Vulnerabilities  Insecure servers or services  Exploitable applications and protocols  Unprotected system or network resources  Traffic interception and eavesdropping  Lack of preventive and protective measures against malware or automated attacks NT2580 Introduction to Information Security…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Intrusion detection system/intrusion prevention system (IDS/IPS) | * System/Application domain * Remote access domain * LAN-to-WAN domain | Integrity |…

    • 299 Words
    • 2 Pages
    Satisfactory Essays