Solution:
Intrusion Detection System (IDS):
- IDS is a system that monitors that monitors network traffic for
suspicious activity.
- It is a software application that scans a network or a system
for harmful activity.
- Any malicious venture or violation is normally reported to an
administrator.
- It monitors networks for potentially malicious activity, they
are also disposed to false alarms.
- We need to first install them for organizations needs to
fine-tune their IDS products.
- It also monitor network packets to check the malicious
activities involved in it and at once sends the warning
notifications.
- Signature-based IDS detect the attacks on the basis of the
specific patterns such as number of bytes or number of 1's or
number of 0's in the traffic. Detected patterns in the IDS known as
Signatures. It is easy when patterns are already in the
system.
- Anomaly-based IDS detect the unknown malware attacks as new
malware are developed readily. It uses Machine Learning because
Machine Learning based method has a better generalized property in
comparison to Signature-based IDS.
Honeypot development :
- Honeypot is a network-attached system set up as a decoy to lure
cyberattackers and to detect.
- Honeypot systems often are hardened OS.
- A Honeypot system might appear to respond to Server Message
Block.
- It is used by large Companies and by enterprise.
- Research honeypot perform close analysis of hacker
activity.
- Production honeypots are usually deployed inside production
networks alongside productions server.
- A production honeypot is designed to appear real and contains
information to attract and occupy hackers to tie up their time and
resources.
Some advantages are following:
- Honeypot collect data from actual attacks and other
unauthorized activities.
- Honeypot capture malicious activities, even if an attacker is
uses encryption.