Monday, September 9, 2019
Network Securty Hardware and IDS systems Research Paper
Network Securty Hardware and IDS systems - Research Paper Example Routers have a built-in mechanism, which ensures LAN protection by blocking the packets invalid packets from moving on the LAN. A router not only checks for the valid destination address but also ensures the delivery of flawless packets to the destination. If a router finds any sort of error in a packet, it discards that packet and sends the remaining message to the destination. Therefore, we can say that a router is a very important data transfer device used on a network. Topic # 2 An Intrusion Detection System (IDS) is a software application, which not only detects and stops unauthorized activities but also reports them to the network administrators for further action. One of the most famous Intrusion Detection Systems is Snort, which is used to detect the presence of worms, malicious activities, and unauthorized accesses. Haas (2010) states, ââ¬Å"Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection systemâ⬠. People ma ke use of Snort software to detect the hacking attempts on their networks. Snort examines every packet that a computer transfers over a network and reports transfer of suspicious packets to the administrators. Snort software manages a database in which it keeps all traffic signatures.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.