Question

In: Computer Science

Using the Internet, search for commercial IDPS systems. Whatclassification systems and descriptions are used, and...

Using the Internet, search for commercial IDPS systems. What classification systems and descriptions are used, and how can they be used to compare the features and components of each IDPS? Create a comparison spreadsheet to identify the classification systems you find.

Solutions

Expert Solution

So Lets see what is an intrusion detection and prevention system, (IDPS), It is is an extension of Intrusion detection system (IDS) technology, which can find and also helps to prevent the intrusion from safely securing attacks the network.

Classification of Intrusion detection system type-1:

• Host Based IDS

• Network Based IDS (NIDS)

• Hybrid Based IDS(HIDS)

Step 2

Classification of Intrusion detection system type-2:

Classification is done on the basis of analysis pattern of the intrusion detection system. This scheme pattern can be broadly divided into two groups:

• Knowledge based Intrusion Detection System

o Expert systems

o Signature analysis

o State transition

o Petri Nets

• Anomaly Based Intrusion Detection System.

o Statistical based IDS

o Neural networks IDS

o Expert system IDS

o Data mining

o Computer immunology IDS

Step 3

Intrusion prevention systems are ofyen classified into four different types:

• Network-based intrusion prevention system (NIPS):

o Checks the entire network for suspicious traffic by examining the network traffic using analyzing protocol and take the appropriate action.

• Wireless intrusion prevention systems (WIPS):

o Monitor a wireless network for suspicious traffic by analyzing wireless networking protocols.

• Network behavior analysis (NBA):

o Examines network traffic to identify threats such as distributed denial of service (DDoS) attacks and policy violations.

• Host-based intrusion prevention system (HIPS):

o A software agent installed in the single host, monitors suspicious activity by analyzing events occurring within that host.

Step 4

Parameters used for comparative analysis is given below:

Type

Category in which this tool belongs.

Operating System

The operating system(s) on which the tool runs. If the operating system is embedded in the tool then a “not applicable” symbol (N/A) is placed in the column.

License

The type of license under which the tool is distributed, e.g., Commercial, Freeware, GNU Public License

Based on

Technique being used to find detection

Comparative analysis of IDPS system based on the parameters in the above table is shown below:

Name

Type

OS

License

Based on

CSP alert plus

HIDS

Windows

Commercial

Rule based

eEye®Retina

HIDS

Windows

Commercial

Rule based

eEye Secure II

web server protection

HIDS

Windows

Commercial

Rule based

GFI events manager

HIDS

Windows

Commercial

Rule based

IBM® real secure®server sensor

HIDS

Windows

Commercial

Rule based

McAfee®

Host intrusion prevention

HIDS

Linux, Windows

Commercial

Rule based

Tripwire® enterprise

HIDS

Linux, Windows ,and unix

Commercial

Audit assessment

Arbor networks peak flow® X

NIDS

N/A

Commercial

Behavior based

Arc Sight®

NIDS

N/A

Commercial

Anomaly based


Related Solutions

Perform an Internet search for three EHR software systems commonly used by physician offices. Compare and...
Perform an Internet search for three EHR software systems commonly used by physician offices. Compare and contrast at least 5 elements in a chart format so that your classmates can see the comparison.
Conduct a search on the Internet for a healthcare app that can be used as a...
Conduct a search on the Internet for a healthcare app that can be used as a tool to aid a healthcare provider or medical coder or that provides the opportunity for a person to take more control over their health and wellness. • Name of the app and URL • Description of function(s); including if it is specific to iOS (Apple) or Android phones • Ease of use • Where your personal information is stored (Examples: the Cloud, personal device)...
Search the Internet for pertinent information that supports the integration of unmanned aerial systems into the...
Search the Internet for pertinent information that supports the integration of unmanned aerial systems into the National Airspace Plan and the Air Traffic Control system. Summarize, describing how ATC Interoperability can be smoothly integrated and also discuss problems associated with this integration. Some subjects to consider are human factors, low altitude operations safety, noise reduction, UAS traffic management, and UAS wake separation standards for UAS integration into the NAS.
Internet Writing Assignment: Perform an Internet search using one or more of the following terms: traceable...
Internet Writing Assignment: Perform an Internet search using one or more of the following terms: traceable fixed costs, common fixed costs, and/or segment margin. Locate an article (less than one year old) from the results of your search. (Make sure that you do not select an instructor’s lecture notes or a class assignment from the results of your search.) After reading the article, write two or three paragraphs that summarize and comment on the article. (Your paper should provide the...
Do a search on the internet using the terms special functions differential equations
Do a search on the internet using the terms special functions differential equations
Search the Internet for financial information about the company selected. Search the Internet for financial information...
Search the Internet for financial information about the company selected. Search the Internet for financial information about the company selected. on Pfizer Comapany Evaluate the following in a 525-word response: Characteristics of common and preferred stock. How stock markets work. The connection between the value of shares and dividends. Mention the ticker symbol of the company studied, the current price of the stock, and its financial history. Indicate if you would recommend investing in this stock and why. Explain.
How long should a key be used before it is replaced? Search the Internet for information...
How long should a key be used before it is replaced? Search the Internet for information regarding cryptoperiods for hash, symmetric, and asymmetric algorithms. Find at least three sources for each of the algorithms. Write a summary of what you find in regards to the recommended times and figure the average time between all three of your sources. Do you agree with the average time for a hash, symmetric, and asymmetric algorithms? What would you recommend for each? Why? Please...
Using the internet, search for two signs that manifest an economic downturn or recession and explain...
Using the internet, search for two signs that manifest an economic downturn or recession and explain why the two you have identified cannot be sufficient for determining a recession. Defend your views by citing information from the Web and/or your own experiences. Post your response on the Discussion Board and then read and reply to the posts of at least two other students, citing those views with which you agree or disagree as well as your reasons for agreeing or...
using an internet search, research an organization that has struggled due to a lack of measurement...
using an internet search, research an organization that has struggled due to a lack of measurement and evaluation within the workplace. In your paper, analyze the role success case methodology would play in improving organizational success. In addition, consider how the four keys of transformational performance measurement may impact this business.
Search the internet for various types of health information systems (ie.e., management, administrative, knowledge management, executive,...
Search the internet for various types of health information systems (ie.e., management, administrative, knowledge management, executive, clinical). Compare and contrast their similarities and differences and how each one might be used by a healthcare manager.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT