Académique Documents
Professionnel Documents
Culture Documents
Douglas
Tochukwu
Chukwu
BITE STUDENT NO:
35953
INTRODUCTION:.....................................................................................................3
2.0. FIREWALLS......................................................................................................4
Definition/Function:................................................................................................4
2.2. First Generation – Packet Filters:.................................................................5
2.3. Second Generation – Application Layer:.........................................................5
Third Generation – “stateful” filters:......................................................................5
Subsequent Development:.....................................................................................6
Types:.................................................................................................................... 6
INTRUSION DETECTION SYSTEM (IDS):.................................................................7
3.1. Definition........................................................................................................ 7
3.2. The key Compelling Reasons To Acquire and Use IDSs IDS............................7
3.3.0. Major types of IDSs......................................................................................8
3.3.1. Process model for intrusion detect systems:...............................................8
3.3.1.1 Information Sources: .................................................................................8
3.3.1.2 Analysis:.................................................................................................... 8
3.3.1.3 Response:..................................................................................................8
3.4.0. Type of Intrusion Detection System:............................................................9
3.4.1. Host-Based IDS (HIDS):................................................................................9
3.4.2. Network-Based IDS (NIDS)...........................................................................9
3.4.3. Application-Base IDS (APIDS).....................................................................10
3.4.4. Protocol-Base IDS (PIDS)............................................................................11
CONCLUTION: .................................................................................................... 11
5.0. REFERENCES:...............................................................................................11
INTRODUCTION:
The idea of a wall to keep intruders dates back thousands of years.
For just a brief example, over ten decade ago, the Chinese built the
Great Wall as protection from neighbouring northern tribes. The
term “Firewall” was in use by Lightoler as early as [1764] to
describe walls which separated the part of a building that is prone to
fire (e.g. a kitchen).
In this project I will rest my ideas on the concept of firewall in a
more modern setting, computer networks. The predecessors to
firewalls for network security were the routers used in the late 1980s
to separate networks from one another. A network which wasn’t
configured properly caused problems on one side of the router and
was largely isolated from the network on the other side; this has
been improved with firewall.
The Intrusion Detection System (IDS) which is designed to detect
unwanted attempts at accessing, manipulating and/or disabling
computer system mainly through a network, such as internet is
either software and/or hardware. It is used to detect several types of
malicious behaviours that can compromise the security and trust of
a computer system. To throw more light to my explanation of ‘An
IDS’; IDS can be composed of several sensors which generate
security events, a console to monitor events and intruders.
2.0. FIREWALLS
• Definitions/function
• First Generation - Packet Filters
• Second Generation - Application Layer
• Third Generation – “Stateful” Filters
• Subsequent Development
• Types.
Definition/Function:
Firewalls are network devices that enforces an organisations
security policy through a protect network called proxy. Proxies
are program that receive the traffic destination for another
computer system, it also requires a user authentication; they
then verify that users are allowed to connect to the destination
before connecting to the destination server on behalf of the
user.
Firewalls are viewed into several types of techniques which can
be explained using these layers of techniques: Packet Filter,
Application Getaway, Circuit-Level Gateway and Proxy Server.
The firewall is a detected appliance that is running on a
computer system which inspects network traffic passing
through the system denies or permits passage based on a set
rule by the proxy server. It is also software or hardware that is
normally placed in the middle of a protected and unprotected
network. ( ACM Journal Name, Vol. V, No. N, Month 20YY.)
Subsequent Development:
This technique was developed by Bob Braden and Annette
DeSchon at the University of Southern California in 1992. The
product is known as “Visas”, which is the first system to have
the virtual integration interface with colours and icons. It is also
the improvement of the other techniques and the existence
deep packet inspection functionality of modern firewalls which
can be shared by the Intrusion Prevention System (IPS). (Bill
Cheswick, System development.pp117, 1990)
Types:
There is several classification of firewall pending where the
communication is taking place. Below are the four important
types of firewall/packet filter:
• Network layer and packet filters
• Application – layer
• Proxies
• Network address translation
3.1. Definition
“Intrusion detection systems (IDSs) are software or hardware
systems that automate the process of monitoring the events
occurring in a computer system or network, analyzing them for
signs of security problems (intrusions)”. It does also can be
viewed as attempts to accommodation the confidentiality,
integrity, availability, or to bypass the security mechanisms of
a computer or network. ()
3.3.1.2 Analysis:
The part of intrusion detection system that actually organizes
and makes sense of the event derived from the information
sources, deciding when those events indicate that intrusion are
occurring or have already taken place. The most common
analysis approaches are misuse detection and anomaly
detection.
3.3.1.3 Response:
The response been taken once the system detect Intrusion.
By these set of action they are typically grouped into active and
CONCLUTION:
Though they both relate to network security, an intrusion
detection system (IDS) differs from a firewall in that a firewall
looks outwardly for intrusions in order to stop them from
happening. Firewalls limit access between networks to prevent
intrusion and do not signal an attack from inside the network.
An IDS evaluates a suspected intrusion once it has taken place
and signals an alarm. An IDS also watches for attacks that
originate from within a system. This is traditionally achieved by
examining network communications, identifying heuristics and
patterns (often known as signatures) of common computer
attacks, and taking action to alert operators. A system that
terminates connections is called an intrusion prevention
system.
5.0. REFERENCES:
2.0. ACM Journal Name, Vol. V, No. N, Month 20YY.