This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Intrusion detection system

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Intrusion detection system

An intrusion detection system is a software application that monitors network traffic for unusual activity and alerts administrators to discover such issues. This software scans the network for policy breaching and harmful activity and reports any malicious activity to IT administrators using event management systems. This event management system integrates all outputs from various sources and applies an alarm filter to distinguish false alarms from malicious activity. Therefore, it provides the function of detecting active attacks on a site or network. This aspect is because even though intrusion detection systems are meant to detect malicious activity, they can be manipulated by false alarms. Hence, firms have to use fine-tuned IDS products when installing them. The IDS also functions by detecting asymmetric route and protocol-specific attacks on a network. IDS also has the ability to block and detect unknown malware and spyware and hence a fundamental complement of other security systems like firewalls (Ambusaidi et al., 2016). These IDS work as signature-based detectors that look for indicators of known attackers or exploits. Once they find these indicators of attacks, it blocks the attack. The other technique of function is called the anomaly-based type of detection. This technique compares the current activity in the network to the normal one for any aberration, which, if found, an alert is sent to administrators.

To a large extent, the functions work through an integration of the intrusion detection system and the protection system. This aspect is because detection without action is nothing and hence the need to act on the detected threats to avoid suffering out of their intrusion. Most of the intrusion detection systems are installed and integrated with prevention mechanisms such as firewalls. Once the IDS detects an abnormally, they can alert the firewall to prevent that abnormally from affecting the system (Duhan and Khandnor, 2016). Standalone IDS can be effective in their function of detecting malware and spyware in the network system, but they need integration with other systems for full protection of the system.

The basic types of intrusion detection systems are network IDS and host IDS. A network IDS is placed or deployed at specific points in a network with the intention of covering those areas that are likely to be attacked. It usually applies the network’s subnets and tries to match the traffic going through those areas to its library or memory of previous attacks (Javaid et al., 2016). This type of network intrusion detection system looks at the network’s traffic passively and hence easily protects the network by making it hard for attackers to detect them. On the other side of the coin host, intrusion detection systems (HIDS) operate on all of the network’s devices that can connect to the internet. HIDS has the capacity to look closely at the internal traffic of the network. This type of IDS investigates all the files of the system. It makes a comparison with files recorded or snapped previously to check for any difference from the normal file sets where if any difference is found, the administrator gets notified. Host IDS usually uses actions based on the host, such as files, kernel logs, and file access. The other difference is that NIDS applies sensors with network interface cards to monitor networks while HIDS is focused on the server and client’s machine installed.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask