Ashford University Deploying Intrusion Detection Systems Research Paper

User Generated

OvtoyhrXvat

Computer Science

ashford university

Description

Prior to beginning work on this assignment, please read Chapter 9 in the textbook. Additionally, read Chapter 3: Intrusion Detection, Chapter 4: Network Based IDPS, and Chapter 5: Wireless IDPS, from NIST Guide to Intrusion Detection and Prevention System (IDPS) (Links to an external site.).

Intrusion detection system (IDS) technologies use many different methods to detect and report incidents. The primary type of malware detection methodology is based on signatures. A signature is a pattern derived from a known threat. Anomaly-based detection looks at deviations from normal patterns in the computing environment and generates triggers based on preconfigured acceptance levels. Stateful protocol analysis detection compares traffic patterns against a predetermined profile usually supplied by the vendor. The degree of deviation from the profile is the indicator of unusual activities.

Research at least two industry resources (e.g., National Institute for Standard & Technology [NIST], Institute of Electrical Engineers [IEEE], and Internet Engineering Taskforce [IETF]) on this topic. (Access the MISM Credible Resource Guide (Links to an external site.) for assistance with finding appropriate credible professional resources.) Based on your findings, compare and contrast the different types of malware detection methodologies. Explain how you would deploy and maintain IDS with up-to-date signatures, changes in traffic patterns, and deviations that are common on computing infrastructures.

The Deploying Intrusion Detection Systems paper

  • Must be 900-1200 words (three to four double-spaced pages) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least three professional and/or US government sources in addition to the course text.
    • Access the MISM Credible Resource Guide for assistance with finding appropriate credible professional resources. You may also see the Ashford Library’s Scholarly, Peer Reviewed, and Other Credible Sources for additional information.
  • Must document all sources in APA style as outlined in the Ashford Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Running head: INTRUSION DETECTION SYSTEM

Intrusion Detection Systems
Student Name
Course
Date

1

INTRUSION DETECTION SYSTEMS

2

Internet Engineering Taskforce
Following increasing concern in the area of the entire community, there has been the
need to develop numerous automatic intrusion detection systems to contain the issue. The IETF
has taken upon themselves to establish internet protocol requirement as a strategy to attain their
missions which include recognizing and suggesting clarifications to the functioning and
mechanical problems present in the internet. Another mission by the industry is providing
specifications to the internet and develop suitable architecture to solve such issues, present
recommendations to the Internet Engineering Steering Group concerning how the protocols can
be standardized and consumed in the internet society. Lastly, the industry aims to provide a
forum where information can be exchanged within the entire internet society. To ensure that all
missions have been fulfilled, the industry subdivided into various segments with various quantity
of staff each assigned to solve a particular challenge. The Intrusion detection working group
(IDWG) from this industry is paying close attention to developing effective protocols that permit
numerous invasion discovery system to communicate in an ordinary way (Aljawarneh, Aldwairi,
and Yassein, 2018).
The tasks executed by IDWG has been in close integr...


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags