Intrusion Detection System Analysis

1268 Words6 Pages

A first concept about Intrusion Detection System (IDS) was given in the early 80s by James P. Anderson. Intrusion detection system can be a physical appliance or security software to monitor the network traffic in order to detect suspicious activity. Many IDS keep information about the detected intrusions in a log file for further analysis or to combine these logs with other data to make policy and decisions. Most of the intrusion detection system detects suspected intrusion and then informs to the system administrator by sending an alert. Originally IDS was thought as a single, stand-alone system based on audit records processing based detection. Today IDS is a distributed system which contains multiple systems combined together [13].

1.7.1 …show more content…

The IDS is situated on the boundary or along a network section to observe most of the traffic on that network section. NIDS can be passively distributed, without many changes to systems. NIDS are very adequate for observing both outward and inward traffic. Load balancing in NIDS permits it to efficiently use the processing power of the nodes in a network for scalability [5]. A single NIDS is capable to secure and protect the entire system. But NIDS cannot monitor the network if the network bandwidth is fully …show more content…

Cluster heads (CHs) are responsible for monitoring their member nodes, as well as participating in the global intrusion detection decisions.

Detection behavior

Based on detection behavior IDS can be classified as follows:
• Attempted breaking and entering: This can be detected by common action of profiles or by security constraint usurpation.
• Masquerade attacks: It is also detected by common characteristics of profiles.
• Invasion of the security control domain: IDS monitor activity and search a particular pattern.
• Discharging: It is detected by observing of resource usage.
• Malicious usage: It is detected by general action profiles, usage of special vantage, by security constraint usurpation.

1.7.4 Characteristics of IDS

IDS have the following characteristics:
• It must work systematically without human involvement.
• its internal functionalities should be examinable for outsiders.
• It must be fault resistant. It must support even in system fall..
• It must oppose system degradation. It should have the ability to observe and analyze itself to guarantee that it has not been modify.
• It must enforce less overhead on the

More about Intrusion Detection System Analysis

Open Document