Open Access Open Access  Restricted Access Subscription or Fee Access

Intrusion Detection and Prevention Technology using Sensor Networks to Protect Firewall from Attacks

R Mahesh Kumar

Abstract


Intrusion Detection and Prevention Systems (IDPS’s) have more intelligence and are built to fill in the gaps left open by firewalls. An Intrusion Detection System is a device that monitors all network traffic. It analyzes the traffic in real-time to determine if someone is sending attacks or malicious traffic on your network. The analysis normally incorporates pattern matching and other techniques that are fast enough to analyze all packets on busy networks .With the growing number of applications allowed in from the Internet and the increased exposure to sophisticated network attacks, it’s ever more important for companies to safeguard their networks. Evasive methods of delivering exploits continue to increase and the problem is further compounded by the growing number of application and OS vulnerabilities, as well as the increasing speed with which new attacks are created to exploit these vulnerabilities. IDP Series Intrusion Detection and Prevention technology using sensor networks offer the latest capabilities in in-line network intrusion prevention system (IPS) functionality to manage the use of unwanted applications and protect the network from a wide range of attacks delivered by those allowed applications. IDP Series appliances deliver comprehensive threat coverage and industry leading response time for maximum protection of network resources.

Keywords


Intrusion Detection and Prevention (IDP), Sensor Networks, Profiler, Fine-Tuning, IPS, Signature Attack Object, Protocol Anomaly Attack.

Full Text:

PDF

References


William R. Cheswick and Steven M. Bellovin, "Firewalls and Internet Security," Addison-Wesley, 1994.

Vern Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Seventh USENIX Security Symposium Proceedings, pp. 31-51, January 1998.

"Network Intrusion Detector," Lawrence Livermore National Laboratory (UCRL-MA-116609 rev.3), November 1997.

Internet Security Systems, Inc., "Internet Security Scanner" and "RealSecure," 1998.

Shadow, SANS Institute, 1998.

Computer Incident Advisory Capability (CIAC), CIAC Bulletins, 1998.

Computer Emergency Response Team (CERT) Coordination Center, CERT Advisories,1998.

Rootshell, Exploit Information and Hacker Tools, 1998.

BUGTRAQ, Bugtraq mailing list archives, 1998.

Computer Operations, Audit, and Security Technology (COAST), 1998.

J.P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania, April 1980.

J MJ. McHugh, A. Christie, J. Allen, “Defending Yourself: The Role of Intrusion Detection Systems,” In IEEE Software September/October 2000 Focus Malicious IT.

SANS Institute Info Sec Reading Room” Understanding Intrusion detection systems”

E. Amoroso and R. Kwapniewski, “A Selection Criteria for Intrusion Detection Systems,” Proc. 14th Ann. Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1998.

Andreas Fuchsberger, ”Intrusion Detection Systems and Intrusion Prevention Systems “Information Security Technical Report Elsevier (2005).

OSSEC (Observing System Science Executive Council) OSS. Homepage of ossec, 2011. http://www.ossec.net/. Online; accessed.

Peter Scarf one, Karen; Mell. Guide to intrusion detection and prevention systems (idps). Computer Security Resource Center (National Institute of Standards and Technology), January 2010.

Joseph Migga Kizza. Computer Network Security.

Vermanitin.; Mattord. Principles of Information Security. Course Technology.

Peter Scarf one, Karen; Mell. Guide to intrusion detection and prevention systems (idps).Computer Security Resource Center (National Institute of Standards and Technology), January 2010.

Robert C. Newman. Computer Security: Protecting Digital Resources. Jones and Bartlett Learning. 2009.

Michael E. Whitman; Herbert J. Mattord. Principles of Information Security. Engage Learning EMEA, 2009.

Tim Boyles. CCNA Security Study Guide: Exam 640-553. John Wiley and Sons, 2010.

Harold F. Tipton; Micki Krause. Information Security Management Handbook.CRC Press, 2007.

John R. Vacca. Managing Information Security. Syngress, 2010.




DOI: http://dx.doi.org/10.36039/AA122013002

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.