Reply needed 1 There have been a lot of attacks on networks and its resources which has brought the needs of detecting intrusions. The inability to prevent these intrusions can result in devalue the credibility of security services which includes integrity, confidentiality, and availability. There different types of intrusion detection systems such as Signature-based Intrusion Detection Systems (SIDS) and Anomaly-based Intrusion Detection Systems (AIDS) introduced to tackle computer security threats.
According to this article, survey research was conducted based on a taxonomy of a comprehensive review of well-known networks and the various techniques that are used by attackers to prevent detection and finally, procedures to make computer systems more secure to avoid intrusions. According to Khraisat, Gondal, Vamplew & Kamruzzaman (2019), Malicious attacks have become more sophisticated and the foremost challenge is to identify unknown and obfuscated malware, as the malware authors use different evasion techniques for information concealing to prevent detection by an IDS (Khraisat, Gondal, Vamplew & Kamruzzaman, 2019). There also other security threats, for example, zero-day attacks purposely to attack internet users. Also, According to this article, As highlighted in the Data Breach Statistics in 2017, approximately nine billion data records were lost or stolen by hackers since 2013 (Breach_LeveL_Index, 2017)
As reported by Liao (2013), A taxonomy intrusion system has offered five subclass classifications and a detailed and unique characteristic which involved Rule-based, State-based, Heuristic-based, Statistics-based, Pattern-based or in the null share, based on signature detection principle, taxonomy and anomaly detection. The article also reviewed that, there were different methods of AIDS that were considered such as Bayesian networks (BN) and Classification Regression Trees (CRC) and combined these methods for higher accuracy.
One of the most challenging attacks for IDS is the Cyber attacks o ICS because of the uniqueness of ICS architectures. When a robust IDs is implemented, it can help to prevent Cyber-attacks which can be done by implementing both software intrusion detection systems and Hardware detection system to pull holds on useful features of both HIDS and NIDS.One theme in this course is effective use of IDS tools to defend against specific types of attacks and misuse. How effective are companies and other organizations at applying IDS for specific purposes? Your assignment for this week is to search for examples either of explicit statements of need for IDS or IPS technology, or for an example of how an organization successfully uses these technologies to defend against specific threats. Possible sources may include news articles, white papers or recommendations from analysts, or even case studies or customer testimonials about specific vendors in the market.
I will be expecting two documents, one for the initial post and one for the replies. See attached for the replies needed
Due on Nov 9th Saturday
Recent Comments