HIDS / AV (AntiVirus) Systems, research paper help

User Generated

aneraqnep7575

Computer Science

Description

All students will be required to complete short research papers with a minimum of three written pages.

  • APA format/style
  • The three-page minimum does not include the title page, references, etc.


HIDS / AV (AntiVirus) Systems Paper

The research paper will focus on HIDS or AV Systems.Computer Virus creates major headaches for most organizations.As this list of 10 worst PC virus outbreaks shows. These viruses combined have caused damages into the billions of US Dollars.How can one protect against virus outbreaks in an organization?What are the common causes of this problems?How would use address this troublesome trend? (Week 4)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

An intruder detection system is not to protect your home against thieves. It is a system
to protect your computer from unwanted, often malicious, viruses, insects, worms and
programs that can be destructive and, in some cases, lead to identity theft depending on what
applications is done on your computer. There are several ways to protect your computer,
information and identity, but none to date are completely fail safe, particularly new viruses
that are not expected detection systems. Basically, there are five types of intrusion detection
systems (IDS) that will be discussed. They are network intrusion detection systems (NIDS),
host intrusion detection systems (HIDS), signature-based intrusion detection systems (SIDS),
anomaly intrusion detection (AIDS) systems and reactive intrusion detection systems base
(RID).
HIDS are located on a particular host. Therefore, its software covers a wide range of
operating systems such as Windows, Solaris, Linux, HP-UX, Aix, etc. Traditionally, HIDS
analyzes particular information stored in registers (such as system logs, messages, lastlogs,
and wtmp) and also captures network packets that are entered / exited from the host to verify
intrusion signals (such as denial of service, backdoors, Trojans, unauthorized access
attempts, malicious code execution, or buffer overflow attacks).
HIDS resides the host itself that they monitor, so they have access to information
collected by the host's own audit tools (activity logs, file system accesses, logs, etc.). Include
templates with different types of Attacks predefined by them, but which are usually also
configurable to include new attacks and variations of the old ones.
Advantages:


They better detect the attacks from within the network, since they monitor the
logins, changes of files, in the registry, etc.



They are able to associate users and programs with their effects on a system
(which system executed that command and when)



HIDS are part of the target itself, so they can report with great accuracy on the
status of the targeted target.



They only care about protecting the host they reside in without needing...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags