Intrusion Detection System is used to resolve computer network security issues. The attackers mainly target independent platforms to perform network intrusions. The intrusion detection system assess access patterns to the network by the intruders and detects their behaviour. The system analyses and monitors the network so that it can detect any signs of security issues. There are two types of intrusion detection technique that are used to detect unusual activities in the network. They are host-based and network-based using source of data. Host based intrusion detection system is developed on individual computer for detecting attacks and network based IDS are developed on raw network data (Quinn & Nadeau, 2015). Additionally, security violation can also be detected in information systems. It prevents exploitation of protocol and software vulnerabilities by intruders. Intrusion Detection System uses various classifiers to detect access patterns to the network.
Data of a specific network environment is accumulated with the help of footprinting. The system vulnerabilities are revealed by the process of footprinting. The objective and location of intrusion are determined at the beginning of the process. After that non-intrusive method is used to gather information about the organisation. The attackers use various technologies and tools to gather these information that proves to be helpful to hackers. The pre-attack phase is referred as footprinting that is the stage before performing the actual attack. The tools that are used for footprinting are traceroute, Nmap and nslookup. The techniques of footprinting that are used are network queries, DNS queries, ping sweeps, port scanning, World Wide Web spidering and network enumeration. Information about target system is gained by the hacker through this process. Internet is surfed by the process of crawling to get information about target. Another web application that is used to get information about target website is WHOIS.
The tools that are used for footprinting are Sam Spade, SuperScan, Nmap and TcpView. DNS interrogation is done with the help of Sam Spade graphical tool. Sam Spade is a key security tool that has the features like Advanced DNS, Zone transfer, Scan addresses, Crawl Website and SMTP relay check. SuperScan tool is used to do TCP port scanning and IP address scanning (Czyz et al., 2016). The tool can scan the selected ports as well as all ports. SuperScan is a powerful and smart tool that is used for footprinting. Nmap tool offers the added advantage of being used in both UNIX/Linux and Windows operating systems. OS identification and ping sweeps can be done through this tool. Another free tool that is used in Windows to monitor all open UDP and TCP ports on local computer is TcpView. TcpView is not regarded as Intrusion Detection System however, gives a picture of all happenings in the computer ports and automatically refreshes them. As a result the user can see all the happenings.
The main function of firewall is to block traffic that is intended to particular IP addresses and server ports. The untrusted traffic are kept away from reaching incoming ports by the use of firewalls. The two network interfaces that are used in Firewall are one for external side and the other for internal side. The unwanted traffic cannot pass from external side to the internal side of firewall interface (Luizelli et al., 2015). The trusted traffic are used to transverse from the external interface of the firewall to internal interface of the firewall. Firewall allows only those users to access the network who have a valid username and password. A secure connection is established between the network and the user by the use of firewall. Firewalls additionally help to eliminate Denial of Service attacks. Denial of Service (DOS) attack takes place when the attacker tries to flood the network with huge amount of traffic that shut down the server. The firewall assess traffic flow thereby resisting the network from DOS attack. Most companies use two firewalls to protect its network. One firewall is connected to the internet and the other to the internal network.
The common features that are provided by almost all type of firewalls are intrusion detection systems, wireless management systems, intrusion prevention systems, quality of service and application control systems. Huge number of next generation firewalls are available in the market that provides the same features (Halpern & Pignataro, 2015). Therefore, to differentiate among them selection criteria should be followed. They include platform type, feature set, manageability, price and support provided. Most of the next generation firewalls are either hardware, software or cloud based. The hardware based next generation firewalls can be applied best to large and middle sized enterprise. Software based next generation firewalls finds best application in small sized enterprise that consists of simple network infrastructures (Chen et al., 2015). The cloud-based next generation firewalls finds best application in highly decentralized enterprise. Additionally, the next generation firewalls should have features such as inline deep packet inspection, website filtering, security of mobile devices, prevention of data loss and threat intelligence. The performance and the quality of service of NGFWs needs to be considered while selecting amongst them. System configuration should be considered before selecting them. The system should be flexible and comprehensive and easy to manage. The price of different NGFW varies considerably with vendor. The price ranges from $599 to $80,000 (Kizza, J. M. (2013). Depending on the type of NGFW to be purchased the price is selected. The support system of the firewalls are also considered as a selecting criteria.
The common security problems that are encountered by a network are Network card and IP address issues, absence of connectivity, slow connectivity as well as problems that are caused by firewall status. In a number of situation two computers are given the same IP address therefore the network face connectivity issues while linking with the computers. The problem can be resolved by changing the IP address of one computer (Balmer et al., 2014). The network card functioning will be solved by checking functionality of the network card. In a network, a number of computer remains undetectable. To resolve this issue all the computers must be within the same subnet consisting of individual IP addresses. The problem of slow connectivity should be solved by sending bulky files in the form of zip files (Liang & Xiao, 2013). The firewall issues can be solved by setting strong firewall settings that will allow computers to share data.
The main reason that makes network security crucial for any business organisation is protecting company’s assets. Information of company is considered as asset to the company that needs to be secured. There are a large number of tangible assets in an organisation that makes it crucial to protect them. The company should take care of the fact that information is not accessed by unknown user. This can be achieved by limiting the access of users to the network. Every organisation has the responsibility of developing their own policy that complies with the regulatory requirements. In businesses like e-commerce and financial services network security is of prime importance as they deal with sensitive data like customer bank account number, credit card details and so on.
The policies to protect network from hackers can be divided into general, responsibility, copyright and system vulnerability policies. The following points will describe the policies in details:
References:
Balmer, M. L., Slack, E., De Gottardi, A., Lawson, M. A., Hapfelmeier, S., Miele, L., … & Bernsmeier, C. (2014). The liver may act as a firewall mediating mutualism between the host and its gut commensal microbiota. Science translational medicine, 6(237), 237ra66-237ra66.
Chen, G., Gong, Y., Xiao, P., & Chambers, J. A. (2015). Physical layer network security in the full-duplex relay system. IEEE transactions on information forensics and security, 10(3), 574-583.
Czyz, J., Luckie, M. J., Allman, M., & Bailey, M. (2016, February). Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. In NDSS.
Halpern, J., & Pignataro, C. (2015). Service function chaining (sfc) architecture (No. RFC 7665).
Jin, X., Li, L. E., Vanbever, L., & Rexford, J. (2013, December). Softcell: Scalable and flexible cellular core network architecture. In Proceedings of the ninth ACM conference on Emerging networking experiments and technologies (pp. 163-174). ACM.
Kizza, J. M. (2013). Guide to computer network security (pp. 387-411). London: Springer.
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys & Tutorials, 15(1), 472-486.
Luizelli, M. C., Bays, L. R., Buriol, L. S., Barcellos, M. P., & Gaspary, L. P. (2015, May). Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions. In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on (pp. 98-106). IEEE.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., & Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Quinn, P., & Nadeau, T. (2015). Problem statement for service function chaining (No. RFC 7498).
Scott-Hayward, S., O’Callaghan, G., & Sezer, S. (2013, November). SDN security: A survey. In Future Networks and Services (SDN4FNS), 2013 IEEE SDN For (pp. 1-7). IEEE.
Yu, T., Sekar, V., Seshan, S., Agarwal, Y., & Xu, C. (2015, November). Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (p. 5). ACM.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download