Question

In: Computer Science

Using the Internet, search for commercial IDPS systems. Whatclassification systems and descriptions are used, and...

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can they be used to compare the features and components of each IDPS? Create a comparison spreadsheet to identify the classification systems you find.

Solutions

Expert Solution

So Lets see what is an intrusion detection and prevention system, (IDPS), It is is an extension of Intrusion detection system (IDS) technology, which can find and also helps to prevent the intrusion from safely securing attacks the network.

Classification of Intrusion detection system type-1:

• Host Based IDS

• Network Based IDS (NIDS)

• Hybrid Based IDS(HIDS)

Step 2

Classification of Intrusion detection system type-2:

Classification is done on the basis of analysis pattern of the intrusion detection system. This scheme pattern can be broadly divided into two groups:

• Knowledge based Intrusion Detection System

o Expert systems

o Signature analysis

o State transition

o Petri Nets

• Anomaly Based Intrusion Detection System.

o Statistical based IDS

o Neural networks IDS

o Expert system IDS

o Data mining

o Computer immunology IDS

Step 3

Intrusion prevention systems are ofyen classified into four different types:

• Network-based intrusion prevention system (NIPS):

o Checks the entire network for suspicious traffic by examining the network traffic using analyzing protocol and take the appropriate action.

• Wireless intrusion prevention systems (WIPS):

o Monitor a wireless network for suspicious traffic by analyzing wireless networking protocols.

• Network behavior analysis (NBA):

o Examines network traffic to identify threats such as distributed denial of service (DDoS) attacks and policy violations.

• Host-based intrusion prevention system (HIPS):

o A software agent installed in the single host, monitors suspicious activity by analyzing events occurring within that host.

Step 4

Parameters used for comparative analysis is given below:

Type

Category in which this tool belongs.

Operating System

The operating system(s) on which the tool runs. If the operating system is embedded in the tool then a “not applicable” symbol (N/A) is placed in the column.

License

The type of license under which the tool is distributed, e.g., Commercial, Freeware, GNU Public License

Based on

Technique being used to find detection

Comparative analysis of IDPS system based on the parameters in the above table is shown below:

Name

Type

OS

License

Based on

CSP alert plus

HIDS

Windows

Commercial

Rule based

eEye®Retina

HIDS

Windows

Commercial

Rule based

eEye Secure II

web server protection

HIDS

Windows

Commercial

Rule based

GFI events manager

HIDS

Windows

Commercial

Rule based

IBM® real secure®server sensor

HIDS

Windows

Commercial

Rule based

McAfee®

Host intrusion prevention

HIDS

Linux, Windows

Commercial

Rule based

Tripwire® enterprise

HIDS

Linux, Windows ,and unix

Commercial

Audit assessment

Arbor networks peak flow® X

NIDS

N/A

Commercial

Behavior based

Arc Sight®

NIDS

N/A

Commercial

Anomaly based


Related Solutions

Perform an Internet search for three EHR software systems commonly used by physician offices. Compare and...
Perform an Internet search for three EHR software systems commonly used by physician offices. Compare and contrast at least 5 elements in a chart format so that your classmates can see the comparison.
Conduct a search on the Internet for a healthcare app that can be used as a...
Conduct a search on the Internet for a healthcare app that can be used as a tool to aid a healthcare provider or medical coder or that provides the opportunity for a person to take more control over their health and wellness. • Name of the app and URL • Description of function(s); including if it is specific to iOS (Apple) or Android phones • Ease of use • Where your personal information is stored (Examples: the Cloud, personal device)...
Search the Internet for pertinent information that supports the integration of unmanned aerial systems into the...
Search the Internet for pertinent information that supports the integration of unmanned aerial systems into the National Airspace Plan and the Air Traffic Control system. Summarize, describing how ATC Interoperability can be smoothly integrated and also discuss problems associated with this integration. Some subjects to consider are human factors, low altitude operations safety, noise reduction, UAS traffic management, and UAS wake separation standards for UAS integration into the NAS.
Using the Internet, conduct a thorough search for more information on using charts in Excel and...
Using the Internet, conduct a thorough search for more information on using charts in Excel and discuss one including a use for your response to my post. The purpose is to learn more about the topic you chose. Do not simply list the "how to" steps. We can get that from the etext and the training. Choose a topic from the following: • Session 4.1 • Create a pie chart • Format chart elements • Create a line chart •...
Internet Writing Assignment: Perform an Internet search using one or more of the following terms: traceable...
Internet Writing Assignment: Perform an Internet search using one or more of the following terms: traceable fixed costs, common fixed costs, and/or segment margin. Locate an article (less than one year old) from the results of your search. (Make sure that you do not select an instructor’s lecture notes or a class assignment from the results of your search.) After reading the article, write two or three paragraphs that summarize and comment on the article. (Your paper should provide the...
Do a search on the internet using the terms special functions differential equations
Do a search on the internet using the terms special functions differential equations
Search the Internet and/or the University Library using a phrase such as, "companies that use data...
Search the Internet and/or the University Library using a phrase such as, "companies that use data analysis." If you choose to utilize the University Library, use the following steps: Click on University Library. Click on the Research Guides tab. Click on Business. Enter a phrase like "companies that use data analysis" in the Enter Search Terms field. Evaluate data analysis and data analytics in a minimum of 700 words, and include the following: Identify two or more organizations that utilize...
How long should a key be used before it is replaced? Search the Internet for information...
How long should a key be used before it is replaced? Search the Internet for information regarding cryptoperiods for hash, symmetric, and asymmetric algorithms. Find at least three sources for each of the algorithms. Write a summary of what you find in regards to the recommended times and figure the average time between all three of your sources. Do you agree with the average time for a hash, symmetric, and asymmetric algorithms? What would you recommend for each? Why? Please...
Search the Internet for financial information about the company selected. Search the Internet for financial information...
Search the Internet for financial information about the company selected. Search the Internet for financial information about the company selected. on Pfizer Comapany Evaluate the following in a 525-word response: Characteristics of common and preferred stock. How stock markets work. The connection between the value of shares and dividends. Mention the ticker symbol of the company studied, the current price of the stock, and its financial history. Indicate if you would recommend investing in this stock and why. Explain.
Using the internet, search for two signs that manifest an economic downturn or recession and explain...
Using the internet, search for two signs that manifest an economic downturn or recession and explain why the two you have identified cannot be sufficient for determining a recession. Defend your views by citing information from the Web and/or your own experiences. Post your response on the Discussion Board and then read and reply to the posts of at least two other students, citing those views with which you agree or disagree as well as your reasons for agreeing or...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT