Thursday, August 8, 2019

Intrusion Detection Systems Essay Example | Topics and Well Written Essays - 500 words - 31

Intrusion Detection Systems - Essay Example A passive monitoring system transmits signals to the owner after a security breach by utilizing a sensor that detects any weird movement. The main advantage of a passive monitoring system is that the units can be deployed randomly minimizing the device attacks. Passive monitoring IDS cannot block suspicious signals on their own; an operator has to be available to block any potential threat. For Inline transmission, the IDS does not transmit signals to the owner rather it auto-responds to the malicious activity by reconstructing the connection to block communication from the suspicious source. The system is configured to automatically alter suspicious signals without any operation by the owner. Inline transmission IDS can block denial of service attack by flooding a system which ends up reducing frequency transmission bandwidth. The disadvantage of the inline transmission is that it has to be placed in line along a network path making it susceptible to damage. The other Inline transmission shortcoming is that the device cannot analyze if a breach was false or legitimate. Authorized users may be denied access to a premise if the alarm has not been keenly identified. Thresholds are used with IDS alerts because they add an extra advantage to the IDS in detecting any intrusion by identifying an attack in a short duration. The early detection can help the administrator to take a quick action in controlling the next breach. A number of simultaneous connections should be considered before implementing IDS. The system sensors are usually limited to the number of connections for which they can detect. Maintenance cost should also be determined because the units require staff training, software licensing as well as customization cost. The mode of transmission should also be considered before deploying and IDS. Administrators should use the active IDS rather than Passive IDS.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.