Find the attached paper. In case you need edits or clarification please let me know.
Running Head: BSC301 APPLIED RESEARCH SKILLS IN ICT
Convert Channels Countermeasure in Current Open Source IDS
BSC301 APPLIED RESEARCH SKILLS IN ICT
IDS (Intrusion Detection System) are classified Network IDS (NIDS) and Host IDS
(HIDS) (1). HIDS are intrusion detection systems that gather data about activity on one system.
Host intrusion detection system is installed into a system that is at risk of an attack. The aim is to
collect information about an attack and communicate it to the administrator. HIDS are also called
sensors. Examples of these short single-threaded are Bro and Snort. HIDS have several
limitations. One disadvantage is that HIDS are unable to detect the traffic of the network . The
other limitation of HIDS is that their sensors weaken when they suspect threat is making them
vulnerable . The last shortcoming of HIDS is that they detect threat at the host point only.
They are importable because they are host-based .
Network-based IDS model of threat detection is multi-threaded. NIDS gathers all