Question

In: Computer Science

1. Provide an explanation of the network detection methods in the chapter, give an example of...

1. Provide an explanation of the network detection methods in the chapter, give an example of their importance and discuss the issue(s) associated with each method.


Solutions

Expert Solution

Q.Provide an explanation of the network detection methods in the chapter, give an example of their importance and discuss the issue(s) associated with each method.

-------------------------------------------------------------------------------------------------------------------------------------------

ANSWER:

Network Detection:

Network detection is define as progressive security solution for obtaining full visibility to both known and unknown threats that cross your network. There are two primary methods of network detection :

1)Signature-based detection

2)Anomaly-based detection

1)Signature-based detection method:

  • A signature-based detection method examines ongoing traffic, activity, transactions, or behaviour for matches with known patterns of events specific to known attacks. As with antivirus software, a signature based detection requires access to a current database of attack signatures and some way to actively compare and match current behaviour against a large collection of signatures.
  • Importance of signature-based detection method:
  • A signature-based detection method focused on searching for a “signature,” patterns, or a known identity, of an intrusion or specific intrusion event.
  • Most IDS are of this type. It needs regular updates of what signatures or identities are common at the moment to ensure its database of intruders is current. This means signature-based IDS is only as good as how up to date its database is at a given moment.
  • Signature-based IDS monitors packets in the Network and compares with pre-configured and pre-determined attack patterns known assignatures.
  • Signature definitions are modeled on known intrusive activity. So, the user can examine the signature database, and quickly determine which intrusive activitythe misuse detection system is programmed to alert on.
  • Misuse detection system begins protecting your network immediately upon installation.
  • There are low false positives as long as attacks are clearly defined in advance.
  • When an alarm fires, the user can relate this directly to a specific type of activity occurring on the network
  • Issues related to signature based detection method:
  • Attackers can get around signature-based IDS by frequently changing small things about how the attack takes place, so the databases cannot keep pace. In addition, it means a completely new attack type may not be picked up at all by signature-based IDS because the signature doesn’t exist in the database. Furthermore, the larger the database becomes, the higher the processing load is for the system to analyze each connection and check it against the database.
  • One of the issue related to signature-based method for malware detection is that it cannot detect zero-day attacks, that is an attack for which there is no correspondingsignature stored in the repository.
  • One of the biggest problem for Signature based NIDS is how to keep up with large volume of incoming traffic when each packet needs to be compared with every signature in the database. So, processing the whole traffic is so time-consuming and will slow down the throughput of the system.

2)Anomaly-based detection method:

  • Anomaly-based intrusion detection system, is an intrusion detection system for detecting network misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature-based systems, which can only detect attacks for which a signature has previously been created
  • Importance of Anomaly-based detection method:
  • Anomaly-based detection generally needs to work on a statistically significant number of packets, because any packet is only an anomaly compared to some baseline. This need for a baseline presents several difficulties. For one, anomaly-based detection will not be able to detect attacks that can be executed with a few or even a single packet.
  • Anomaly-based intrusion detection system. An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous.
  • Anomaly-based network intrusion detection plays a vital role in protecting networks against malicious activities.
  • Anomaly-based network intrusion detection techniques are a valuable technology to protect target systems and networks against malicious activities.
  • Issues related to anomaly-based detection method:
  • Due to the underlying assumptions of anomaly detection mechanisms, their false alarm rates are in general very high compared to misuse detection systems.
  • There are other equally obvious advantages to using anomaly-based IDS, it detects any traffic that is new or unusual, the anomaly method is particularly good at identifying sweeps and probes towards network hardware


Related Solutions

Provide a brief explanation of the planning phase in developing business strategy. Give an example.
Provide a brief explanation of the planning phase in developing business strategy. Give an example.
1. Give an example of the application for each of the following network models. (Do not...
1. Give an example of the application for each of the following network models. (Do not explain model with layers. Provide examples where these models are used). a. DoD model b. OSI c. RINA
Give an example of combining unsupervised and supervise learning methods to provide solutions in real world....
Give an example of combining unsupervised and supervise learning methods to provide solutions in real world. How should companies plan and deal with the consequence of implementing an analytics solution?
Select one explanation for democratization. Provide an example of a case that proves that this explanation...
Select one explanation for democratization. Provide an example of a case that proves that this explanation is either incorrect or insufficient.
1. Describe the difference between instance methods and class methods in Java and give an example...
1. Describe the difference between instance methods and class methods in Java and give an example of each. 2. A class variable is visible to and shared by all instances of a class. How would such a variable be used in an application? 3. Describe the difference between abstract classes and concrete classes, giving an example of each. 4. Explain how data are encapsulated and information is hidden in Java? 5. Explain the difference between a class and an interface...
1. What are the Detection Methods for Carbohydrates, Lipids, and Protein?
1. What are the Detection Methods for Carbohydrates, Lipids, and Protein?
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to...
Fraud Detection Methods: Describe the various fraud detection methods used by auditors and forensic accountants to uncover fraudulent activity.
1.Explain the four merchandise inventory methods and provide an example for each
1.Explain the four merchandise inventory methods and provide an example for each
Give a personal example of a good that has a positive network externality. Give a personal...
Give a personal example of a good that has a positive network externality. Give a personal example of a good that has a negative network externality. Explain why you chose these two goods.
Provide examples of the following Structural conditions. Give an example of stress. Give an example of...
Provide examples of the following Structural conditions. Give an example of stress. Give an example of strain. Give an example of shear. Give an example of an item that has moved beyond the elastic range and become plastic.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT