Deployment and implementing of an ids, Computer Network Security

Assignment Help:

DEPLOYMENT AND IMPLEMENTING OF AN IDS

The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to install, configure, and monitors IDS, workstations management, the size of the storage required for retention of the data which is generated by the systems.

IDS Control Strategies


IDS can be implemented by means of one of three basic control strategies

-Centralized: all the IDS control functions are implemented and managed in a central location which is shown in Figure given below.

-Fully distributed: all control functions are applied at the physical location of each IDS component that is shown in Figure A given below.

-Partially distributed: combines two; while individual agents can analyze and respond to local threats, they report to hierarchical central facility to enable organization to detect widespread attacks that is shown in Figure B given below.

 

 

                                        2098_DEPLOYMENT AND IMPLEMENTING OF AN IDS.png

                                                                   Figure A--Centralized IDS controls

                                      1379_Fully distributed.png

                                                            Figure B--Fully Distributed IDS system

 

 

                                          1242_Partially distributed.png

                                                             Figure C--Partially Distributed IDS system


Related Discussions:- Deployment and implementing of an ids

TCP / IP, Let me know the details of protocol tcp/ip

Let me know the details of protocol tcp/ip

Websphere administrator, Websphere Administrator: Working as Webspher...

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

Ids-information security, IDS Intrusion is a attack on information assets...

IDS Intrusion is a attack on information assets in which instigator attempts to gain entry into or disrupt normal system with harmful intent Incident response is an identificatio

Policy management-information security, POLICY MANAGEMENT Policies should...

POLICY MANAGEMENT Policies should be managed as they constantly change. Good policy development and maintenance make a more resilient organization. All policies undergo tremendou

Describe privacy-protecting techniques, Question: a) What do you meant...

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Computer security incident response team, QUESTION 1 Using a real life ...

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Firewall architectures-screened subnet architecture, Screened Subnet Archit...

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

Research paper, how much would you charge for minimum 20 pages

how much would you charge for minimum 20 pages

Distinguish between a mobile agent state and code, Question: (a) Disti...

Question: (a) Distinguish between a mobile agent "state" and "code". (b) Differentiate between "weak" and "strong" mobility. (c) Mobile agent systems are known to have

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd