Monday, October 8, 2012

Effectively manage the security of network intrusion detection system

This day and question about it Internet security in the age make sure your business is protected from malicious online attacks is not an important facet. And the whole system comes online, vulnerable to attack for those who don't realize it and leave it in the virtual world. Security software, such as firewall and anti-virus installation gives an effective solution, property is very simple and easy.

Provides intrusion detection, managed online for computer and network security, is a type of security management.

Similarly, safeguards against intrusion detection system security management, and other types, such as computer and network. Collect ID information intrusion of computer or both-research organizations from different disciplines in the network to find security breaches that may contain from attack and misuse. Is called the technology to monitor it as an integrated computer system or network security and vulnerability assessment scans.

Intrusion detection system works.

1. Make sure both system and user behavior analysis

2. Inspect the system configuration or vulnerability.

3. Evaluate the integrity of systems and files.

4. Detect and prevent network intrusions

5. Adopt the management role of anti-virus and anti-spyware.

6. Recognize the typical pattern of attack.

7. Check the abnormal activity patterns.

8. Follow the user policy violations.

Main site and the White House, NATO is responding are expanding ID system is increased for a number of attacks on networks, such as the Department of Defense, U.S. Department of Defense. Technology of sophisticated scammers towards computer and Internet security is more and more difficult. In addition, via the web is available request for scientific and technical capacity of the tested method is less easily.

There are ways to group ID listed below:

Misuse detection and anomaly detection

Detect abuse, reviews and compares the system information and an enormous database to collect and attack signatures. This software is a cross-referenced packet across the comparison, and attack signature database. Anomaly detection, system administrator creates a baseline or normal network traffic load, breakdown, Protocol, and a typical packet size status. Anomaly detector to investigate a network segment, also compares the appearance of standard baseline abnormal conditions.

Network and host-based systems

Network-based systems, each packet examined the network through. This system is overlooked by a firewall monitors malicious fabrication. Host-based system, review of the activities of each individual computer or host.

Passive and reactive systems

Passive intrusion detection system, a potential breach of security log information it should be, by the place the network security alert as collateral. Reprogramming reactive system stops the network traffic for suspicious activity and avoid potential attacks for the firewall to log off the user will be prompted.





No comments:

Post a Comment