Thursday, September 26, 2019

Fiber Optic Security Systems Thesis Proposal Example | Topics and Well Written Essays - 2500 words

Fiber Optic Security Systems - Thesis Proposal Example They analyze the information such as calls, File systems and modifications application logs and other host information to detect and suppress attacks. Wireless IDPS: They are used to detect intrusions on the wireless system and rogue access points (unauthorized wireless access point used by hackers). Other IDPS systems PIDPS: (Packet Intrusion Detection System) used for packet sniffing to detect attacks. APIDS: It monitors a group of servers by analyzing and monitoring communication between the application protocols. Hybrid intrusion detection systems: Hybrid intrusion detection systems are more efficient and effective in detecting attacks and controlling them. They consist of a combination of several intrusion detection systems integrated into one device. The key function of IDPS systems are Detection of intrusion Recording of information on the detected events Notifying the administrator of the detected events Trigger preventive measures such as port blocking, limiting access of the suspect program as well as deleting infected files. The main parts of an IDPS system are: Sensor: generates the security event Console: monitors the event Engine: it records the events logged by the sensors in a specified database. 1.2.2 Methods of detecting intrusion Though there are many methods of detecting intrusions, the principal methods are: Signature based intrusion The IDPS detects a given pattern corresponding to a known threat. The known events are those that were detected and are known to cause harm in the past. For example, an email with an attached file (freepics.Exe) is usually a characteristic of malwares, or an operating system log with code 645 that depict that the host is disenabled or a...A malicious program or E-mail causes unwanted manipulation and alteration of information and files, deleting of vital information and emails, software corruption and the transfer of information without the authority or consent of the user or the system administrator (Crothers, 2002). The major roles of IDPS are to protect networks and computers from: Host based IDPS; Identifies intrusion on hosts and agents. They analyze the information such as calls, File systems and modifications application logs and other host information to detect and suppress attacks. Hybrid intrusion detection systems: Hybrid intrusion detection systems are more efficient and effective in detecting attacks and controlling them. They consist of a combination of several intrusion detection systems integrated into one device. The IDPS detects a given pattern corresponding to a known threat. The known events are those that were detected and are known to cause harm in the past. For example, an email with an attached file (freepics.Exe) is usually a characteristic of malwares, or an operating system log with code 645 that depict that the host is disenabled or a Telenet with user name 'root' that violates security policy.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.