eduzhai > Applied Sciences > Engineering >

Project Carbon

  • Save

... pages left unread,continue reading

Document pages: 6 pages

Abstract: Security is an important and serious issue for every type of network. Many network environments, specially those where computers are used as nodes are prone to an increasing number of security threats in the form of Trojan worm attacks and viruses that can damage the computer systems, servers and communication channels. Though Firewalls are used as a necessary security measure in a network environment but still different types of security issues keep on arising. In order to further strengthen the network from intruders, the concept of intrusion detection system (IDS) and intrusion prevention system (IPS) is gaining popularity. IDS is a process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats or violations of computer security policies or standard security policies. Intrusion prevention system (IPS) is a process of performing intrusion detection and attempting to stop detected possible incidents. The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before, we see that the Internet is changing computing as we know it. The possibilities and opportunities are limitless; unfortunately, so too are the risks and chances of malicious intrusions. In Network Security, intrusion detection and prevention system is the act of detecting activity or action that attempt to compromise the confidentiality, integrity or availability of a resource. This paper presents an overview of the technologies and methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS). Intrusion Detection and Prevention System (IDPS) technologies are differentiated by the types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

Please select stars to rate!


0 comments Sign in to leave a comment.

    Data loading, please wait...