Host based Intrusion Prevention

Intrusion Detection Systems (IDSs) recognize the presence of malicious code within traffic that flows through the holes punched into the firewall, our first layer of defense. Though, the word “intrusion detection” is a bit of a misnomer.

Richard Kemmerer and Giovanni Vigna of the University Of California, Santa Barbara, elucidate in an article in the IEEE Security and Privacy magazine: “Intrusion detection systems do not detect intrusions at all–they only identify evidence of intrusion, either while in progress or after the fact.” (Edwin E. Mier, David C. Mier, 2004)

An IDS recognizes security threats by detecting scans, probes and attacks, however does not block these patterns; it only reports that they took place. Yet, IDS logged data is invaluable as proof for forensics and incident handling. IDSs as well detect internal attacks, which are not seen by the firewall, and they help in firewall audits.

IDSs can be divided into 2 main categories, footed on the IDS alarm triggering mechanism: anomaly detection-based IDS and misuse detection-based IDS.

Anomaly detection based IDSs report deviations from “normal” or expected behavior. Behavior other than “normal” is measured an attack and is flagged and recorded. Anomaly detection is as well referred to as profile-based detection. The profile describes a baseline for normal user tasks, and the quality of these user profiles directly has an effect on the detection capability of the IDS. Techniques for constructing user profiles comprise: (Nong Ye, 2003).

Rule-based approach–Normal user behavior is characterized by creating rules, however analyzing normal traffic is a complicated task. A related approach is protocol anomaly detection.

Neural networks–These systems are trained by presenting them with a large amount of data, together with rules regarding data relationships. They then find out if traffic is normal or not; abnormal traffic raises an alarm.

Statistical approach–Activity profiles describe the behavior of system or user traffic. Any deviation from normal triggers an alarm.

The advantage of anomaly detection is that it can identify previously unknown attacks and insider attacks, without the need for “signatures”– that is., predefined attack profiles.

One more benefit of anomaly detection is that it’s impossible for the attacker to know what activity causes an alarm, thus they cannot assume that any particular action will go undetected.

The disadvantage of anomaly detection is that it produces a large number of “false positives”– that is., alerts that are produced by legitimate activity. In addition, besides being complicated as well as hard to understand, building and updating profiles as well need a lot of work.

The other most important approach, misuse-detection based IDS (also called signature-based IDS), triggers an alarm when a match is found to a “fingerprint”-a signature contained in a signature database. These “fingerprints” are footed on a set of rules that match typical patterns of exploits used by attackers. As there is a known database of exploits, there are few false positives.

The disadvantage is that misuse-detection IDSs can merely detect already-known attacks. Besides, the “fingerprints” database needs to be incessantly updated to keep up with new attacks. The majority IDS products in the market at present use misuse detection.

Writing Quality

Grammar mistakes

F (49%)

Synonyms

A (93%)

Redundant words

D (68%)

Originality

86%

Readability

F (38%)

Total mark

D

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyStudyWriters
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Business and administrative studies
Thanks
Customer 452773, March 3rd, 2023
Philosophy
Thank you
Customer 452811, February 17th, 2024
Humanities
Thank youuuu
Customer 452729, May 30th, 2021
Business and administrative studies
Thank you for your hard work and help
Customer 452773, February 21st, 2023
Human Resources Management (HRM)
excellent
Customer 452773, June 25th, 2023
Business and administrative studies
Excellent job
Customer 452773, March 17th, 2023
Management
Thank you!!! I received my order in record timing.
Customer 452551, February 9th, 2021
Business and administrative studies
Perfect
Customer 452773, February 23rd, 2023
Business and administrative studies
perfect
Customer 452773, February 23rd, 2023
BUSINESS LAW
excellent job made a 93
Customer 452773, March 22nd, 2023
Business and administrative studies
Thank you for your hard work
Customer 452773, October 19th, 2023
Leadership Studies
awesome work as always
Customer 452773, August 19th, 2023
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp