Lack of countermeasure to detect covert channel in current open source IDS (700 words only)

Anonymous
timer Asked: Oct 22nd, 2018
account_balance_wallet $9.99

Question Description

I will forward you the required documents after I confirm the tutor.

For this assignment is a research article. It expects me to do an literature review first before doing experimental approach.

The research article title: Lack of countermeasure to detect covert channel in current open source IDS

The requirement for this assignment:

Help me add in another 150 word count for introduction section.

Need a subsection on Suricata 550 word count for literature review section. (Brief review of

Provide around 6 references(prefer journal article) IEEE citation

Try to find those article with this 3 point( something like an overview of Suricata)

  • using suricata to detect covert channel
  • how to countermeasure covert channel by using suricata
  • the effectiveness of suricata

Notes: Please do not delete or edit any word in this report (Assignment outline) as this is an group assignment with my team. FYI I'm using Kali Linux for Suricata. Have to assume you are doing an experiment for this research article

Tutor Answer

Alphabet
School: UCLA

Find the attached paper. In case you need edits or clarification please let me know.

Outline

Introduction
Body
Conclusion
References


Running Head: BSC301 APPLIED RESEARCH SKILLS IN ICT

Convert Channels Countermeasure in Current Open Source IDS
Student Name
Course
Instructor’s Name
Date

1

BSC301 APPLIED RESEARCH SKILLS IN ICT

2

Introduction
IDS (Intrusion Detection System) are classified Network IDS (NIDS) and Host IDS
(HIDS) (1). HIDS are intrusion detection systems that gather data about activity on one system.
Host intrusion detection system is installed into a system that is at risk of an attack. The aim is to
collect information about an attack and communicate it to the administrator. HIDS are also called
sensors. Examples of these short single-threaded are Bro and Snort. HIDS have several
limitations. One disadvantage is that HIDS are unable to detect the traffic of the network [1]. The
other limitation of HIDS is that their sensors weaken when they suspect threat is making them
vulnerable [1]. The last shortcoming of HIDS is that they detect threat at the host point only.
They are importable because they are host-based [1].
Network-based IDS model of threat detection is multi-threaded. NIDS gathers all
informa...

flag Report DMCA
Review

Anonymous
Good stuff. Would use again.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors