preview

Detection Systems For The Network

Better Essays
As we know the computer network and communication has brought many sophisticated changes to the networking world, But it also made the network systems vulnerable to attacks by hackers anywhere at a distance. These attacks usually start by interrupting the network through some host and encouraging further more attacks on the network. The hackers usually use sophisticated techniques in interrupting the network, they use some softwares which will hardly use some traditional techniques to hack the network. Therefore we need some detection systems to detect the unusual data approaching the network. Therefore we discuss on two types of intrusion detection systems , their development, principal, working and its pros and cons. In this…show more content…
A littler framework can be setup for the single sensor to screen the movement by switch, passage or switch. These intrusion detection systems are need in now a days on the grounds that it is difficult to dependably follow along on potential treats and vulnerabilities of the computer organizing framework. Today 's reality is changing and advancing with new advances and the web. intrusion detection systems are tools which are situated in distinguishing the attacks and vulnerabilities in this evolving environment. Therefore we need to curb these attacks by using intrusion detecting systems to detect the attacks. Without these tools, it becomes very difficult and damage to the computer systems. FIGURE 1: Computer network with intrusion detection systems Attacks can be partitioned into two classifications • Pre-intrusion activities • Intrusions 1.2 Pre- Intrusion activities: Pre intrusion activities are utilized to plan for intruding into a system. These incorporate port checking and IP spoofing to identify the attacker or intruder. • Port scans: A program will be utilized by programmers to interface with the framework and figure out what TCP or UDP ports are open and vulnerable against attack, which is called as scanner. These scanners will discover which PC on the system is vulnerable against attack and focus the services running over the
Get Access