Preview

Nids

Powerful Essays
Open Document
Open Document
2445 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nids
“Network intrusion detection system (NIDS) is an independent platform that identifies intrusions by examining network traffic and monitors multiple hosts. Network intrusion detection systems gain access to network traffic by connecting to a network router, network switch configured for port mirroring, or network tap.”

Akhila Isuranga
44172

Content
1. Overview 1.1 What is Internet Security? 1.2 Intruder
2. Network intrusion detection system (NIDS) 2.1Signature base detection 2.2 Anomaly detection base
3. Architecture of NIDS 3.1Component of NIDS 3.2 Sensor placement in NIDS
4. Traffic controlling of a network
5. DMZ – Demilitarized zone.
6. Snort 6.1 What’s snort? 6.2 Architecture of Snort 6.3 Rules content 6.4 Snort download and installation 6.5 Snort configuration 6.6 Traffic capturing

7. Vulnerabilities and Attacks vs. NIDS
8. Capabilities of NIDS monitoring:
9. Disadvantages of NIDS
10. References

1. Overview

1.1 What is Internet Security?
In today’s environment we need to contact each other through networks. Most of the devices or networks are interconnect to other devices or networks. As a result of this connection you are able to share your files, documents, etc. but when you are sharing you need to connect to a network and to the internet. When you connect to the internet you are taking a risk, cause your sharing files or documents may visible to others or intruders can steel your important files without a leaving a single mark. As a result of this Internet Security was introduced to protect your system from intruders.

1.2 Intruder
Intruder is a person who is trying to connect to your network without your prior permission. There are two types of intruders. * Insider – insider is the most dangerous type of intruder. This person is who has a permission to enter your network. Most insiders are trying to mischief or steel your files. It

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Of the six categories of attackers, the one I would most want to break into my network would be hackers, as they attempt to penetrate your network and expose vulnerabilities, then inform you of them. This is opposed to a cracker, which will do the same thing, only steal the data and attempt to sell it. A script kiddie is very dangerous, as they are generally under-experienced hackers and crackers who use someone else’s codes and almost always have malicious intent.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Which of the following can be defined as a person who uses his or her expertise to gain access to other people’s computers?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Better Essays

    * IDS and IPS monitoring of incoming and outgoing network traffic, including anti-virus, anti-spyware and signature and anomaly-based traffic monitors.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    To secure against attacks from the internet and the external networks the use of a strong antivirus software and internet security software in all the workstations, hosts and servers is important. In addition to this it is important to have a network security policy that will clearly stipulate the use of the Library property and also provide the guidelines on using personal resources in the library network. Since the network is private a white list of all authorised wireless networks should be maintained to avoid unauthorised access from external wireless networks. It is also important to ensure that all hardware and software is in secure zones and environments to avoid physical damage (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    People will always be tempted to go onto the network and to browse the web on their own. Employees can dowload music or videos and possibly games which hand affect the security contols sometimes when those who don’t have authorized access to the network, they will continuously try to attempt to connect. Its best to notify anyone who is authorized on the network to know that there is an unauthorized attempt to log in. there are created policies that are made just to inform employees of risk managing and prevention. Notify are very important to the workstation. All employees must be able to know when there is authentication failure. Viewing log files can show all the security events which allow an administrator to check into it and find he root causes.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Sec 280 Week 1

    • 667 Words
    • 3 Pages

    In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 - Info Sec

    • 2576 Words
    • 10 Pages

    Anytime a user attempts to access a network, the server logs the attempt. In this lab, you first used the…

    • 2576 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Unauthorized access from public internet – Operating system, software patches, updates, change passwords often, and hardware or software firewall.…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. When selecting a UPL the Commander must take into consideration which of the following qualifications? The commander appoints an officer or non-commisned officer ( e-5 r above) on orders as the UPL…

    • 3727 Words
    • 15 Pages
    Satisfactory Essays
  • Good Essays

    Network design

    • 753 Words
    • 4 Pages

    The IPS with Application Level Gateway Firewall security appliance will be installed to secure the private network from the Internet and provide IPSec VPN connectivity to the main UMUC office. The Intrusion Protection System (IPS) is able to inspect network traffic, examine and filter based on information contained within the data portion of a packet. It help the IT personnel monitor, log, and detect security breaches. It could use to send security breach alerts, terminate security breaches, and terminate or restart processes.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Hacking Tools

    • 351 Words
    • 2 Pages

    The tools that have been including in this report are a description of a few of the hacking tools used. They can not only work against your network, but help you. You can use these tools to help further protect the resources, data, and information on your local network or other networks. So make sure that you get to know these tools well as you might use them to help you, but also must know what to protect your network…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    hackers

    • 377 Words
    • 2 Pages

    White Hat Hackers- These are Hackers that try to break into systems in order to help a company/corporation find the weaknesses in their system. They have no malicious intent and they are used to deter black hat hackers.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays