Verified Document

Intrusion Detection And Prevention Systems IPDS Research Paper

Protecting Vital Resources Intrusion Detection and Prevention Systems

IDPS and Components

Intrusion from the outside world, for good or bad, is serious concern in the networked global arena (Ierace et al., 2005). The loss of data and important and confidential business information can be utterly disastrous. Network systems that will detect and prevent such intrusions, therefore, are a necessity of the first order among enterprises. Intrusion attacks can come from hackers, malware or other old or new malicious creations from other sources. Intrusion detection is performed by monitoring computer systems and networks to sense indications of potential threats or violations on an organization's security policies. Another added feature is thwarting these threats before they can occur. Together, these are the components of an intrusion detection and prevention system or IDPS (Ierace et al.).

There are four classes of IDPS according to their functions and the methods they use (Ierace et al., 2005). These are network-based, wireless, network behavior analysis, and host-based systems. The network-based system monitors the whole network of all suspicious materials by scrutinizing all protocol activities. The wireless system oversees and analyzes all wireless network protocols of all suspicious phenomena. The network behavior analysis system investigates network traffic and identifies threats that create any unusual activity. This includes distributed denial of service attacks, malwares and violations of policies. And a host-based system is an installable software, which monitors a given host for probable or suspicious activities, by observing and scrutinizing these activities (Ierace et al.).

Components

These are sensors or agents, management servers, database servers, and consoles (Ierace et al., 2005). All four types have these components in common. Sensors or agents perform the monitoring and...

Management servers are centralized devices, which operate sensors or agents, receive the information they receive and then process these information collected. Database servers are not a vital part of the IDPS but these are repository of information received from sensors or agents. And consoles are a software program, which is installed on the desk or laptop. It configures sensors or agents and applies software updates. It only monitors (Ierace et al.).
Options for Implementing IDPS

Most intrusion prevention systems use one of three methods, namely signature-based, statistical anomaly-based, and stateful protocol analysis (Kanika, 2013). Signature-based detection characterizes an already known intruder or threat. Examples are a Telnet threat with a username of root, which violates an organization's security policy, or TCP SYN packets sent successively to different ports with free ring tones as subjects. This method compares observed occurrences or phenomena with a set of known or established signatures to detect possible intrusion or attempt. It is similar to an anti-virus scanner in that it also needs updates. Anomaly-based detection compares observed phenomena on a network or a host with their normal activity. It detects deviations from normal activity by means of threshold detection and profile detection. And stateful protocol analysis is somewhat similar to anomaly-based detection. But they differ in that stateful protocol analysis relies on universal profiles, which specify the use of protocols (Kanika).

Steps in Intrusion Detection

The first is to set up and lock a firewall, which is like a front door (Kanika 2013; Ierace et al., 2005). A firewall protects inside possessions from strangers outside through prevention software and prevention hardware. The second is to use or install software, which will reinforce security. It is beneficial to average PC users and easy to use and…

Sources used in this document:
BIBLIOGRAPHY

Ierace, N., et al. (2005). Intrusion prevention systems. Ubiquity Information Everywhere:

Association of Computing Machinery. Retrieved on February 12, 2014 from http://ubiquity.acm.org/article.cfm?id=1071927

Kanika (2013). Intrusion detection system and intrusion prevention system -- a review study. Vol. 4 Issue 8, International Journal of Scientific and Engineering Research;

International Scientific and Engineering Research. Retrieved on February 12, 2014
from http://www.ijser.org/paper/Intrusion-Detection-System-and-Intrusion=Prevention-SysteA=Review-Study.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Cisco Systems: History, Overview, and
Words: 962 Length: 3 Document Type: Research Paper

Cisco has "bought 36 companies, including WebEx, a Web meeting specialist, for $3.2 billion…Cisco also picked up PostPath, a maker of e-mail software, and Jabber, a leader in corporate instant messaging" (Vance 2008). At present, unified communications is a small part of Cisco's annual revenue, but one it intends to grow. Another ambitious venture it intends to embark upon within the next few months is its introduction of a computer

Cisco Systems Culture
Words: 495 Length: 2 Document Type: Term Paper

Cisco Systems Culture Organizational Goals for Recruiting and Retaining Employees Cisco is a company that has a high rate of retention on its employees. According to Yves Lermusiaux, in his Recruiting at Cisco, the company's highest turnover rate in the 90s was 7.3%. In 1999, it only has 6.3% of turnovers. Randall Birkwood, Cisco's Director of Employment, states the following formulas with regards to retaining employees (Lermusiaux, 2000). The right culture for Cisco's

Cisco Systems: Firm Strategy and Internal Strengths.
Words: 1289 Length: 4 Document Type: Term Paper

Cisco Systems: Firm Strategy and Internal Strengths. Cisco Systems, the self-proclaimed "worldwide leader in networking for the Internet," has dominated similar firms in its industry. As Wall-Streets' beloved stock and an essential stock in any investor's portfolio, with over 35,566 employees worldwide and boasting revenues totaling 22.2 billion in the previous fiscal year the company aims to ensure that networks both public and private operate with maximum performance, security, and flexibility. As

Cisco Systems: Internet of Things
Words: 2374 Length: 9 Document Type: Research Paper

Strategic Business Unit of Publicly Traded Organization The objective of this study is to select any strategic business unit from a publicly traded multi-national corporation and to analyze the overall competitive environment including market conditions, evaluate the current growth and new business strategies, along with implications, analyze the organization's primary business model, evaluate the organization's competencies and resources, evaluate the leveraging of growth strategies through partnerships and alliances and identify future

Cisco Systems Uses Its Culture for Competitive Advantage
Words: 564 Length: 2 Document Type: Case Study

Cisco Problem Identification Cisco is a well managed company that has successfully maneuvered past downturns in the company through a management structure that encourage teamwork. Although the teamwork model has been successful, it took a great deal of time form many in the company to adapt to the new structure including the changes in the compensation model which is now heavily based on meeting organizational goals through teamwork. At the current time

Cisco ERP Case Study Cisco
Words: 750 Length: 2 Document Type: Case Study

The Cisco Board of Directors had to vote and approve of the plan. ERP installations are not just a large it project. They are instead a complete re-examining of the company's business model and a re-defining of interprocess communication and the defining of process conduits between systems. In short, Cisco completely re-architected the core business processes that their company was based on, down to the Bill of Materials (BOM)

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now