Security Solutions India

 

Access Control & Security Systems Online Directory


Home
 

Google  

 
Browse Sub Categories
 

Asset Protection

Data and Information Security
Software and Security
 

You are here: Home >>Computer and Information security>>Network Intrusion Detection

Network Intrusion detection

Your network should have some network intrusion detection system. With that said, the method of detecting intrusions, how to monitor, and how to interpret the data is a complex subject.

Intrusion Detection Types

  • Network - Used to protect the network or a large part of it. It listens to all available network packets and tries to find any intrusion pattern based on the information in the packets. Where this type of IDS is placed on the network is important since it cannot analyze all packets behind routers, bridges, or switches.
  • System - Used to protect a specific host such as a webserver. This kind of intrusion system can be especially effective when a server is in an area off the firewall such that it is neither on the internet or on the internal network { Known as a Demilitarized zone (DMZ) }. These kinds of intrusion detection systems can usually only protect one service well.

Intrusion Detection Systems

Intrusion detection systems typically consist of two parts which are an engine and a control console. These two parts are usually on separate computers. Obviously the console is used to control and make changes to the behavior of the intrusion detection engine. The engine analyzes the network traffic and takes appropriate action if an intrusion is detected.

Since network intrusion detection systems must process a lot of network data in a short time, these systems require a good deal of processing power. They also require much RAM for high performance, and may require much hard drive space to store log information.

Intrusion Detection Features

  • Attack patterns are saved in a database.
  • Data packet reassembly - Some may or may not re-assemble IP packets the same way a receiving system would reassemble them. Most IDS do not reassemble the packets in this manner. Without reassembling the packets as the receiver, some attacks may go unnoticed.
  • Checksum verification - A good IDS will verify packet checksums to be sure the packet has not been tampered with.

Related Topics on Computer and Information security

  1. Software Vulnerability Control
  2. Firewall Protection
  3. Network Intrusion Detection
  4. Network Port Scanning
  5. Network Tools passwords
  6. Types of attacks
  7. Application Level Protection
  8. Systems Protection
  9. Mail and Security
  10. Hostile Software

For more topics and tutorials visit - http://www.comptechdoc.org

Browse Categories

Computer And Information Security
CCTV, Surveillance Systems, Equipment & Components
Access Control Components, Equipment And Systems
Alarms, Burglar, Electronic Systems, Equipment & Components
Fire Protection, Detection & Controls
Intrusion Detection
Perimeter Security, Fences, Ballistic
Security & Specialty Services
Security Design Services
Facilities Systems
Miscellaneous

Find Products for :-

 

Find Solutions for:-
Complete information on security services, guarding services, investigators, detectives and security systems. We also have a online directory guide of the companies providing services the above services in different states of India like Delhi, Mumbai, Gurgaon, Banglore, Noida etc. 

www.securityservicesindia.com

 

A Directory on Insurance as well as Insurance related topics updated to the latest. A total solutions site for your basic to advanced Insurance needs
 

www.insurance4india.com

 

Want a loan? Learn the pros and cons for taking a loan and lots of information for your finance problems.

www.finance4india.com

 

Plan a trip to India! Visit the beautiful, culture rich country having diverse climates, castes, languages and creed. Each visit will add a new experience in your life, select your tour and make a trip to India with us

www.visitindia.org.in

 

 
 

  © Copyright 2005. securitysolutionsindia. All Rights Reserved.