Importance of Intrusion Detection Strategies To A Firm

Importance of Intrusion Detection Strategies To A Firm

Name:

Course:

Institution:

Instructor’s name:

Introduction

There have been a lot of attacks reported by people who uses computers and other network related devices to help them perform some tasks efficiently. Not forgetting the recent occurrence at our company which made us lose a lot of information from our database. Intrusion which is also known as the threat can be defined as the deliberate actions trying to access information from a system without relevant authority, manipulating the information or sometimes rendering the system unstable through the exploitation of critical data from the system (Scheidell,2009).

Importance of intrusion detection

Due to the interference reports from the IT department recently, the intrusion detection systems should be implemented to help curb the current attacks affecting our systems. The IDS is so useful since it can protect our systems. So far we have been using the normal intrusion detection (NIDS).However, its shortage comes now when discovering new and cyber-attacks. Another NIDS which uses anomaly detection is called MINESOTA   intrusion detection which uses three groups and uses the connection time –based features. However, since our company has been using the NIDS which is not as efficient as the Minesota, I would recommend that we shift to the intrusion that has been modified to detect any form of attacks. The gaps of this intrusion are the course of the recent attacks we experienced in this firm, and this is due to its inability to protect the system from all the attacks (Scheidell, 2009)

Conclusion

  The intrusion detection is an important issue in the entire computer networks that has received a lot of attention. This system can use the scan neutral network to recognize the universal temporal behavior of the notorious network attacks (Day, C.W. 2007). Despite this, it has a pocket capture engine that captures pockets taking them to the preprocessing stage for analysis. The preprocessing step using the two pipes extracts the relevant information or factors for port scan and host sweep attacks. Once the system is trained and set, it can produce the immediate response to inputs in a fixed time frame.

                                                                      Work cited

Day, C. W. (2007). U.S. Patent No. 7,260,846. Washington, DC: U.S. Patent and Trademark Office.

Scheidell, M. (2009). U.S. Patent No. 7,603,711. Washington, DC: U.S. Patent and Trademark Office.

All Rights Reserved, essaytalent.com
Disclaimer: