Intrusion detection week 8 assignment
docx
keyboard_arrow_up
School
Kenyatta University *
*We aren’t endorsed by this school
Course
SIT 306
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
6
Uploaded by ProfessorProtonWombat25
Intrusion detection week 8 assignment
1
Intrusion Detection and Response Reflection Summary
Student’s Name:
School Affiliation:
Professor’s Name:
Course Name:
Date:
Intrusion detection week 8 assignment
2
Introduction
The procedures needed to stop and identify attacks launched by intruders are examined in a
reflection of ISSC 642 Intrusion Detection and Incident Handling. The first week's readings
covered the traits of an intruder and network security monitoring. In the first week, one was
required to comprehend what Network Security Monitoring and Intrusion Detection entailed.
The DoD Dir 8570.1 Information and Assurance Workforce Improvement Program had to be
read by individuals. The students were introduced to one another in the forum.
The forum from Week Two asked participants to discuss threat models, implementation
considerations, and network security monitoring tools. Deployment issues when Network
Security Monitoring is used to get complete content data were covered in the forum for week
two of the course. The focal points of Week Three’s learning objectives were understanding
statistical data, session data, and the methods used to acquire the data. The goal of the third
forum week was to explain the differences between statistical data, complete content data,
session data, and the technologies used to collect the data.
The forum task for week four was to distinguish between alert data, which included
generation tools, and previously mentioned NSM monitoring, which also included collecting
tools. In week four, the class read about alert data and alert data tools. The participants also
completed a midterm exam and a summary of an idea paper during week 4.
The classus covered a variety of methods for detecting, evaluating, protecting, and
responding to security monitoring in week five. Killing with Keyboards File was the topic of
debate on the forum in Week 5; for this project, one was to identify potential dangers,
weaknesses, and risks associated with using open, free WiFi.
The basics of DNS were covered in the reading for week 6; the participants also identified
Normal, Malicious, and Suspicious Port 53 Traffic. Describing session data from distinct
Intrusion detection week 8 assignment
3
segments was the learning objective. The forum from week six asked participants to
categorize any network activity as Normal, Suspicious, or Malicious.
The forum from Week Seven participants studied the concepts of Intruders versus Network
Security. The panel from Week Seven asked participants to identify the many strategies
hackers take to escape detection, such as disguising their identity and spoofing their address.
The class must also recognize hackers’ various tools to access a system. Packit Tool Kit, IP
Sorcery, LFT, and Fragroute are tools they utilize; the forum assignment was to define the
various tools and what they are.
Week 8's assignment, "Social Engineering: Anatomy of a Hack," discussed how simple it was
to enter a company's network system. The class learned specifics about how simple it was to
breach a computer system from a security professional. Chris, a network consultant, ran a
penetration test to determine how far he could get into the company's network and servers
and quickly gained access to its secrets.
My course experience
My experience in this course has been eye-opening; it has taught me how to spot intrusions
and deal with situations.
The concepts of intrusion detection, numerous detection tools to
utilize in an incursion, and how to identify and profile invaders might all be examined and
evaluated by me. I'm so fascinated by what I've discovered that I want to earn a master's
degree in cybersecurity.
Identify and explain the course's relevant conceptual material (theories, concepts).
The way to deal with situations occurring in a computer system, or to organize and analyze
them for signs of realistic episodes, which are violations or unavoidable risks of breaches of
PC security procedures, effective employed strategies, or standard security practices, is to use
interruption identification or intrusion detection from this course.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Intrusion detection week 8 assignment
4
According to
Islam
et al. (2019), the path of interruption detection and attempting to halt
specific occurrences is interruption aversion, also known as intrusion detection. According to
Vieira
et al. (2019)
,
potential personal
events are the main focus of interruption discovery and
aversion frameworks, which record information about them, seek to prevent them, and alert
security chiefs to them.
According to
Camacho
et al. (2019), Intrusion Detection Prevention Systems are used by
associations to prevent intrusions for a variety of reasons, including resolving individual
security provision problems, documenting current threats, and deterring security provision
abuse. Nearly every association's security foundation now includes IDPSs as a necessary
addition.
While a network-based intrusion prevention system (NIPS) is produced to go one step further
and attempt to stop the attack from proceeding, a network-based intrusion recognition method
is made to monitor traffic passively and raise alarms when malicious activity is identified.
According to
Gao
(2019), the (NIPS) Network Intrusion Protection System is typically
inserted in line with the traffic it monitors to accomplish this. Each network packet is
examined before being sent on, and if it doesn't trigger an alarm based on a signature match
or anomaly guideline, it is not passed on. Untrustworthy packets are dropped, and a signal is
set off.
How the course concept/idea/theory may change your future actions/activities.
The concepts, ideas, and theories from this course will change my future actions and
activities when utilizing WiFi and social media. I would not be using public WiFi any longer.
Due to how this class has impacted how I view the internet and how simple it is for me or
someone else to act, I will be more cautious when posting on social media.
Intrusion detection week 8 assignment
5
Computer networks were initially developed to communicate with gadgets and share
information. Examining, accessing, and sharing material via communication networks (such
as the Internet) has become a part of individuals’ daily lives thanks to significant
advancements in electronics and network transaction technologies over the past few decades.
According to
Vieira
et al. (2019)
,
p
reventing unauthorized usage, access, and invasion has
become essential for all data systems and connection networks since a significant portion of
this material is frequently confidential or has restricted access only for appropriate persons.
One of these kinds of safety instruments for network security is an intrusion detection system
(IDS).
Conclusion
In conclusion, since it keeps an eye out for hostile behavior, intrusion detection systems are a
tool that all agencies should adequately employ. IDS that use signatures to identify attacks do
so by examining particular patterns, including network traffic's byte sequences. This training
has been one of my best experiences because I now know what to look for online.
Intrusion detection week 8 assignment
6
References
Camacho, J., García-Giménez, J. M., Fuentes-García, N. M., & Maciá-Fernández, G. (2019).
Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to
the needle.
Computers & Security,
87, 101603.
Gao, J., Chai, S., Zhang, B., & Xia, Y. (2019). Research on network intrusion detection based
on incremental extreme learning machine and adaptive principal component
analysis.
Energies,
12(7), 1223.
Islam, S. R., Eberle, W., Ghafoor, S. K., Siraj, A., & Rogers, M. (2019). Domain knowledge
aided explainable artificial intelligence for intrusion detection and response
—arXiv
preprint arXiv:1911.09853.
Vieira, K., Koch, F. L., Sobral, J. B. M., Westphall, C. B., & de Souza Leão, J. L. (2019).
Autonomic intrusion detection and response using big data.
IEEE Systems
Journal,
14(2), 1984-1991.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help