Computer Science
ISSC 641 Central Texas College Intrusion Detection and Cybersecurity Paper

ISSC 641

Central Texas College


Question Description

I need help with a Computer Science question. All explanations and answers will be used to help me learn.

I have attached my approve topic.

Your outline will include:

References (at least ten).


Your final paper should be between 10 to 15 pages long. Be sure the report is in MS Word, Times New Roman font, with double spacing and 1 inch margins all-around, no additional spaces allowed. Cover page and references pages are required. Your paper must adhere to APA standards.

Your final deliverable for this project should provide detailed discussion on the topic that you selected in Week 2. Your paper should include both foundational knowledge of the topic as well as applicable uses in the work place today. Game and mobile phone features are not acceptable.

Prepare a 8-10 page double-spaced (including title or reference pages) research paper based on any topic in the text or something covered in this class.

Paper organization will include:

  • Introduction
    • Clearly define the problem, issue, or desired topic that was researched.
    • Starts out broad and becomes more and more specific.
  • Body
    • Present the relevant literature and ideas.
    • Identify relations, contradictions, gaps, and inconsistencies in the literature.
    • Possible solutions to any problem(s) identified.
  • Conclusion
  • References (at least ten).

You may use web resources as references, however make sure to include all your resources and cite from them with author, year of publication, and the corresponding page or paragraph numbers.

Unformatted Attachment Preview

Running Head: INTRUSION DETECTION Intrusion Detection ISSC 641 March 13, 2020 Intrusion Detection Introduction 1 INTRUSION DETECTION 2 Intruders are people without permission to access information in the computer system. Many organizations have regulations in place to ensure that only authorized individuals have access to the system. Still, in some cases, the intruders often manage to successfully get into the system. In Information Technology, there are Intrusion Detection Systems that help to note when an unauthorized individual has gained access to the system or is trying to gain access to the system (Kene & Theng, 2015). With this software, a company can easily stop an impending attack or can minimize the effect of an attack. In most attacks, the intruders often stay in the system for days, weeks, or even months before being identified. The longer an intruder stays in the system, the more data they will steal, and the more damage they will cause. The intrusion detection system mainly monitors the system and provides a report of its findings (Javaid, Niyaz, Sun, & Alam, 2016). The system can detect an intruder trying to enter the system, but it cannot do anything to prevent this intruder from gaining access. The system will only send a notification to the administrator informing them of the suspicious activities. It is then up to the administrator to block the intruder from gaining access or to log out the intruder if they are already inside the system. A company must have an active team to compliment the IDS. If the IDS sends a notification and no one takes any action, the intruder will gain access to everything in the system and will have the opportunity to do as they please. Another function of the IDS is to detect the vulnerabilities of the system. When a company understands the areas that cause a risk to cybersecurity, it will do all it can to mitigate these risks. Having an intrusion detection system installed into a company’s computer system can help most companies keep intruders out of the system, Problem Statement INTRUSION DETECTION 3 Cybersecurity is a major issue in today’s modern tech world. Companies, as well as people, overly rely on technology, which makes cybersecurity a necessity. In most attacks, intruders often get into the system and steal information without being noticed. Before the organization finds out about the intruder being in the system, the damage has already been done. Cyber-attacks have been on the rise in the recent past, and their severity keeps on increasing because of the lack of resources to help in preventing these attacks from causing extensive damage. Relevance & Significance The topic is relevant, seeing as most affected companies by cyber-attacks often find the intruders long after they gained entry, and by this time, the intruders have done a lot of damage. One of the biggest recent cyber-attack in 2019 is the Capital One data breach. During this attack, the hacker gained entry into the system and gained access to sensitive information. The intruder managed to access the personal information of the company’s customers in the US and Canada. The total number of affected clients in the US was 100 million, and in Canada, the affected customers totaled to six million (Flitter & Weise, 2019). The company was not aware of the attack until a cyber-security researcher informed them on 17th July. After receiving the notification, the company analyzed their own and confirmed that there was indeed an intruder in the system. Their investigation also concluded that the intruder gained access on 22nd and 23rd march 2019 (Mathews, 2019). This information shows that the intruder was in the system for close to four months. The length of time the intruder was in the system explains why a lot of information was stolen. Once the company discovered the breach, they fixed it immediately. If it had not been for the researcher, more damage would have been done since it seems that the company lacks the resources to determine when suspicious activities are going on INTRUSION DETECTION 4 in its systems. Such cases are why Intrusion Detection is a relevant subject. If Capital One had detected the intrusion earlier on, they would have fixed it, and only a few or none of the customers would have been affected. This topic is significant because it helps in the promotion of cybersecurity. Some hackers have advanced skills and can easily surpass the firewall used by a company; the Intrusion Detection System helps with such cases (Shone, Ngoc, Phai, & Shi, 2018). The research will provide detailed information about this system by clearly explaining how it works and how it can help in ensuring system security. The research will also provide information on the implementation of this system and the training needed for the company employees who will get affected by the changes incurred because of this system. Other than providing information on this system, it will explore ways in which intruders can get into the system despite there being strong security measures in place. Also, it will help give insight into what a company can do once they get the notification that suspicious activities are going on in the system. The significance of this research is to help the private sector and the public sector know how they can prevent attacks from happening and how they can minimize the attacker has launched the effect of the attack. References INTRUSION DETECTION 5 Flitter, E., & Weise, K. (2019, July 29). Capital One Data Breach Compromises Data of Over 100 Million. Retrieved from Javaid, A., Niyaz, Q., Sun, W., & Alam, M. (2016). A Deep Learning Approach for Network Intrusion Detection System. Proceedings of the 9th EAI International Conference on Bioinspired Information and Communications Technologies (formerly BIONETICS). doi:10.4108/eai.3-12-2015.2262516 Kene, S. G., & Theng, D. P. (2015). A review on intrusion detection techniques for cloud computing and security challenges. 2015 2nd International Conference on Electronics and Communication Systems (ICECS). doi:10.1109/ecs.2015.7124898 Mathews, K. (2019, August 2). Incident Of The Week: Historic Capital One Hack Reaches 100 Million Customers Affected By Breach. Retrieved from Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50. doi:10.1109/tetci.2017.2772792 ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Your work is already complete. Please have a look at it and let me know if you need any correction before you submit it.The other file is the outline on the same. Otherwise, it is always great working with you. Goodbye for now. 👋



Title: Intrusion Detection

Student’s Name
Course Name


Intrusion Detection

Cybersecurity is a major issue in today’s modern technology world. Companies, as well as
people, overly rely on technology, which makes cybersecurity a necessity. In most attacks,
intruders often get into the system and steal information without being noticed. Before the
organization finds out about the intruder being in the system, the damage has already been done.
Cyber-attacks have been on the rise in the recent past, and their severity keeps on increasing
because of the lack of resources to help in preventing these attacks from causing extensive damage.
Intrusion detection systems have developed since the advancement of the internet. Intrusions in
information systems are activities that result in the violation of the security policies of the system.
Intrusion detection is the method used for the identification of malicious activities or policy
violations (Shone, Ngoc, Phai, & Shi, 2018). Intrusion detection systems monitor and prevent the
attempt to encroach or compromise the system and network resources. Intrusion detection systems
involve mechanisms put in place to warn the organization about any unapproved access to the
organization's system. The intrusion detection systems also bridge the gaps that are left by firewall
techniques as they only act as a fence around a network. The intrusion detection systems are
capable of recognizing attacks that firewalls fail to prevent. Intrusion detection systems, as a result,
have received increasing attention in the previous years.
Intrusion detection systems are devices or software application systems for network
monitoring for suspicious activities or violations in the network policies. Any intrusions or
policy violation is reported either to an administrator or a central collection is done using a
security information and event management system. Security information and event management
system involve combination of outputs from varied sources and utilizes alarm filtering methods
for distinguishing malicious activity from false alarms.



Instinctively, intrusions in information systems are the activities resulting in the violation
of the security policy of the network. Intrusion detection is the procedure employed for the
identification and detection of the intrusions. Intrusion detection is the observation and possibly
preventing intrusion attempts or otherwise compromising the system and network resources.
Intrusion detection systems range from single computers to large computer networks. The
most common classifications include host-based intrusion detection systems and network
intrusion detection systems (Liao, Lin, Ying, & Tung, 2013). Host-based intrusion detection
systems check on essential operating system files while network intrusion detection systems are
involved in the analysis of inbound traffic in a system. Moreover, intrusion detection systems can
be classified based on their detection method. These include signature-based detection which
involved in the recognition of malicious patterns such as malware and anomaly-based detection
involving deviation detection based on good traffic model relying on machine learning.
Reputation-based detection is also an intrusion detection method involving the recognition of
reputation-based probable threats based on reputation scores. Intrusion prevention systems have
intrusion detection and response capabilities. Intrusion detection systems serve the purpose of
augmenting intrusion prevention systems with custom tools such as the application of honeypot
for attraction and characterization of malicious traffic.
Intrusion detection systems and firewalls relate to network security. However, the
intrusion detection systems and firewalls differ. Traditional network firewalls employ a fixed set
of rules for permission or denial of network connections. The firewall constrains intrusions
provided the necessary set of rules is defined. They limit access between networks for the
prevention of intrusions. However, they do not give alarms for attacks from inside the network.
Intrusion detection systems, on the other hand, describe suspected intrusions upon their


Rice University

I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

The tutor was pretty knowledgeable, efficient and polite. Great service!

I did not know how to approach this question, Studypool helped me a lot.