Different Types of Intrusion Detection Systems Essay

Pages: 4 (1305 words)  ·  Bibliography Sources: 4  ·  File: .docx  ·  Level: Master's  ·  Topic: Computer Science  ·  Written: July 10, 2019

It combines both hardware and software to work effectively since the servers used to host the application and deployment into the system being monitored. In a corporate network with TCP/IP protocols, there will be a main server with all the software and applications for detection intrusion.

Firewall Integration and Optimum Locations for IDS on Corporate TCP/IP Network

In such a dynamic network, both anomaly-based and signature-based IDS will be deployed to maintain the network intrusion protocols and detect any disallowed activity. Monitoring such a dynamic network needs servers that are to be placed in every department of the organization. The Host-based IDS monitors the status of the crucial files and detects if an intruder creates, deletes or modifies files in the monitored network. Host-based IDS triggers alerts to the administrator when any file attribute has been tampered with, new files being created and files deleted from the system. In a corporation, network protocols are complex since data packets are to be analyzed from everywhere. The organization's satellite offices also need to be interconnected and monitored centrally from the headquarters and this ensures the security of the company’s data is solely handled by an employee of the organization who is highly knowledgeable in computer networking. They mostly use firewalls since firewalls help detect and prevent intrusion.

Buy full Download Microsoft Word File paper
for $19.77
Firewalls have the capability of detecting attacks and preventing them by redirecting them to a sandbox for analysis. Host-based IDS can be deployed together with the firewalls to detect the patterns and teach the firewall new security protocols to initiate and counter any intrusion into the system by malicious hackers. At the protocols of the network, the Host-based IDS will be deployed to monitor each protocol initiated and detect any unwanted traffic. The application layer has various security protocols that ought to be monitored, transport layer that monitors the flow of data between two hosts making it ideal for intrusion detection, and network layer that monitors traffic in and out of the system and alerting the administrator on intrusion and also monitor devices attached to the system to make them protected.

Essay on Different Types of Intrusion Detection Systems Assignment

In summary, an intrusion detection system is an application used in the detection of malicious activity on a computer network. They are specifically designed to monitor network activity, traffic in and out of the network and to stop any intrusions into a system that may compromise the security and integrity of that system. It combines both hardware and software to work effectively since the servers used to host the application and deployment into the system being monitored. Together with firewalls, they can prevent a system from being attacked, data being leaked and loss of sensitive data to hackers. Intrusion detection systems find anomalies and uncertainties in the system and warn the administrator of imminent danger. They are designed to alert the users of any danger to information and sensitive data and combines with firewalls they make a system impenetrable to hackers.

  1. Arora, H. (2011, November 2). TCP/IP Protocol Fundamentals Explained with a Diagram. Retrieved from TheGeekstuff: https://www.thegeekstuff.com/2011/11/tcp-ip-fundamentals/
  2. Asmaa Shaker Ashoor, P. S. (n.d.). Importance of Intrusion Detection System (IDS). International Journal of Scientific Engineering Research, 3-7.
  3. B.Santos Kumar, T. S. (2013). Intrusion Detection System- Types and Prevention. International Journal of Computer Science and Information Technologies, 77-82.
  4. Mr Mohit Tiwari, R. K. (2017). INTRUSION DETECTION SYSTEM. International Journal of Technical Research and Applications, 38-44.

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (4 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Incident Response and Computer Forensic Investigation Research Paper

Data Center Design Research Paper

Honeypot Help Security Professionals to Do Their Research Proposal

Designing Good Deceptions in Defense of Information Systems Term Paper

Enterprise Technical Infrastructure Security Plan Research Paper

View 200+ other related papers  >>

How to Cite "Different Types of Intrusion Detection Systems" Essay in a Bibliography:

APA Style

Different Types of Intrusion Detection Systems.  (2019, July 10).  Retrieved September 23, 2020, from https://www.essaytown.com/subjects/paper/system-involving-intrusion-detection/2689680

MLA Format

"Different Types of Intrusion Detection Systems."  10 July 2019.  Web.  23 September 2020. <https://www.essaytown.com/subjects/paper/system-involving-intrusion-detection/2689680>.

Chicago Style

"Different Types of Intrusion Detection Systems."  Essaytown.com.  July 10, 2019.  Accessed September 23, 2020.