Network Security Share Dcit 418-Slide 2
Network Security Share Dcit 418-Slide 2
based IDS.
ED Ansong Dept of Slide
Computer Sc. 2
Learning Objectives
security.
• Discuss challenges associated with intrusion
place
How IDS works
• IDS operation:
– Network-based intrusion detection syst. (NIDS)
– Host-based IDS (HIDS)
– Application-based systems (AppIDS)
Advantages
operations
Disadvantages
• Can be overwhelmed by volume of network
traf fic
packets)
How NIDS works
Advantages
Disadvantages
• Harder to manage than NIDSs
system, HIDS
network devices
(DoS) attack
How HIDS works
• Steps:
systems
degree of coverage
Measuring E ectiveness of
IDS
• IDSs are evaluated using two dominant metrics:
– # of attacks detected in a known collection of probes
– Network bandwidth at which IDSs fail
• Design goals:
systems
subnet
hinder compromise
network tra c
• To use packet sni er legally, administrator must be on
security breaches.
C ptography in Network Security
dec ption.
C ptography in Network Security
dec ption.
• Digital Signatures: Verifying the authenticity
data transmission.
technology
Access Control Devices
criteria:
an authorized person.
E ectiveness of Biometrics
unauthorized person.
organization’s needs
• Scanning and analysis tools are used to