correct firewall policy can minimize the exposure of many networks however they
are quite useless against attacks launched from within. Hackers are also evolving
their attacks and network subversion methods. These techniques include email based
Trojan, stealth scanning techniques, malicious code and actual attacks, which
bypass firewall policies by tunneling access over allowed protocols such as ICMP,
HTTP, DNS, etc. Hackers are also very good at creating and releasing malware for
the ever-growing list of application vulnerabilities to compromise the few services
that are being let through by a firewall.
IDS arms your business against attacks by continuously monitoring network activity,
ensuring all activity is normal. If IDS detects malicious activity it responds
immediately by destroying the attacker's access and shutting down the attack.
IDS reads network traffic and looks for patterns of attacks or signatures, if
a signature is identified, IDS sends an alert to the Management Console and a
response is immediately deployed.
An intrusion is
somebody attempting to break into or misuse your system. The word "misuse"
is broad, and can reflect something severe as stealing confidential data to something
minor such as misusing your email system for Spam.
is an IDS?
An IDS is the real-time
monitoring of network/system activity and the analysing of data for potential
vulnerabilities and attacks in progress.
Need For IDS
Services (IIS) web servers - which host web pages and serve them to users - are
highly popular among business organizations, with over 6 million such servers
installed worldwide. Unfortunately, IIS web servers are also popular among hackers
and malicious fame-seekers - as a prime target for attacks!
As a result, every so often, new exploits emerge which endanger your IIS web server's
integrity and stability. Many administrators have a hard time keeping up with
the various security patches released for IIS to cope with each new exploit, making
it easy for malicious users to find a vulnerable web server on the Internet. There
are multiple issues which can completely endanger your Web server - and possibly
your entire corporate network and reputation.
People fell there is nothing on their system that anybody would want. But what
they are unaware of is that, there is the issue of legal liability.
You are potentially
liable for damages caused by a hacker using your machine. You must be able to
prove to a court that you took "reasonable" measures to defend yourself
from hackers. For example, consider if you put a machine on a fast link (cable
modem or DSL) and left administrator/root accounts open with no password. Then
if a hacker breaks into that machine, then uses that machine to break into a bank,
you may be held liable because you did not take the most obvious measures in securing
You may also like this : Crusoe Processor, Human Computer Interface , HPJava, Gaming Consoles, Fluorescent Multi-layer Disc, Futex, Extreme Programming (XP), Earth Simulator, Compact peripheral component interconnect, corDECT Wireless in Local Loop System, Param 10000, Elastic Quotas, Refactoring, On-line Analytical Processing (OLAP), Pivot Vector Space Approach in Audio-Video Mixing, QoS in Cellular Networks Based on MPT, Wireless Fidelity, Voice morphing, Radio Frequency Light Sources, Speed Detection of moving vehicle using speed cameras, Optical Packet Switching Network, Storage Area Networks, Smart Note Taker, MPEG-7, Motes, Modular Computing, MiniDisc system, Migration From GSM Network To GPRS, M-Commerce, C# , IP Telephony, RPR, Broad Band Over Power Line, Rapid Prototyping , Dashboard , Optical Satellite Communication, Optical packet switch architectures, Layer 3 Switching , Intrution Detection System, Multiterabit Networks, InfiniBand, Light Tree , Multicast, Inverse Multiplexing, Neural Networks And Their Applications, Parallel Computing In India, Quadrics Interconnection Network, Structured Cabling, Virtual LAN Technology, RTOS/RTSI,IT Seminar Reports, PPT and PDF.