This website uses cookies to ensure you have the best experience. Learn more

Network Security Sensors Essay

922 words - 4 pages

There are numerous network security devices and tools available intended to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. This will be an analysis of the features and benefits for various Intrusion Detection/Prevention Systems (IDPS) and other network traffic monitoring tools in regards to defending high value targets against attacks from advanced persistent threats. The current generation of security devices has an exceedingly difficult time in providing an absolute defense against such threats, and the situation is particularly grim for targeted, novel attacks.

Due to the multitude of tools and device categories available, it can be very difficult to identify the correct tool for the job at hand and to fully understand the seemingly infinite combination of interactions that can occur within the network. To simplify this problem, the primary network sensor that will be looked at is the IDPS.

Intrusion Detection/Prevention System Categories

Technically, Intrusion Detection Systems and Intrusion Prevention Systems are different. However, they essentially work via the same mechanism and share similar goals. IDS and IPS will both monitor the network and try to identify malicious activity originating from or traveling within the network; the IPS just has the additional functionality of automatically blocking such activity because it usually sits inline with traffic flow. There are four general types of IDPS, as defined by NIST:

I will focus on the Network-Based and Network Behavior Analysis types, due to my network security background. These IDPS types will monitor the network or network segment they are connected to and will analyze them for signs of possible incidents. Incidents are defined as 'exploiting of a vulnerability to attack the confidentiality, integrity or availability of an information system' [cite sec man textbook later]. Specifically, this can included attacks from malicious logic, DoS attacks, reconnaissance of the network, and data ex-filtration (IDPS is also one of the few defenses against the troublesome 'insider threat').

Upon detecting an incident, the IDPS will signal an alert. In the case of inline IPDS, this can also mean dropping packets(acting like a firewall ), throttling bandwidth usage (in the case of suspected DoS attacks), or sanitizing malicious content (often seen in host-based AV and mail filters). If the alert is made when there is actually no security incident, it is known as a false positive. Because these systems are automated, they must be tuned to decrease false positives. It is often necessary to have many false positives in order to avoid missing detecting a real incident (known as a false negative). This leads into a major shortcoming of IPS': because IPS systems are intended to operate inline with the network and drop malicious packets, if they issue a false positive it means that...

Find Another Essay On Network Security Sensors

Wireless Sensors Networks Security Essay

2213 words - 9 pages reasons. There have been significant contributions to overcome many weaknesses in sensor networks like coverage problems, lack in power and making best use of limited network bandwidth, however; work in sensor network security is still in its infancy stage. This paper is an effort to introduce the security issues in wireless sensor networks, highlight the current research efforts, and to determine the future directions to solve the unresolved

Communication Technologies for Implantable Sensors Essay

1346 words - 5 pages chronic illness sometimes need to be monitored closely by medical team. By having the patients attached with suitable sensors which can transmit data over the network, it is possible for the patients to have long-term monitoring without the need for a long and expensive stay in hospital. For long term and long distance monitoring, implantable sensors are desirable. Implantable sensors are inserted into human body so that it does not disturb the

wireless sensor networks

1238 words - 5 pages A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Trust in networks may be defined as the degree of belief or confidence about the nodes on the past interactions and observations. So trust becomes a major issue for reliable communication in WSN under constraints. We propose a

Applications of Smart Dust

4045 words - 16 pages sensors could be used for Illegal or unethical purposes such as Individuals, corporations and government can use motes to monitor people without their knowledge in their respective work places. And these types of privacy issues have been raised in the past. Security Smart dust motes are also prone to security concerns similar to that of computers on the net. One of the reasons might be that motes in network can be re-programmable. This allows any

Using Networks to Develop a Smart Home

1159 words - 5 pages they can live independently. LOGICAL NERWORK LAYOUT Logical network PHYSICAL NETWORK LAYOUT Physical nertwork NETWORK SPECIFICATION Hardware Devices Description Light Control -Automate the lighting in your home according to schedules, or triggered by automation rules. -Can createad a rule that turns a light on when a door is open. Touchpad -Manage and monitor your system (checking all the sensors in

Elements Of Network Security

1606 words - 6 pages Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and

Technical Security Policy Proposal for Small Company

1266 words - 5 pages Kizza, J. (2011). Computer network security and cyber ethics. (3rd ed.). Jefferson: McFarland & Company Inc. Massachusetts Institute of Technology. (n.d.). Viruses, Spyware, and Malware. Retrieved March 29, 2014 from http://ist.mit.edu/security/malware Securities and Exchange Commission. (2003). SEC Interpretation: Electronic Storage of Broker-Dealer Records. Retrieved March 29, 2014 from http://www.sec.gov/rules/interp/34-47806.htm SeverCheck.com. (n.d.). Best Practices for Data Center Infrastructure and Server Room Environmental Monitoring. Retrieved March 29, 2014 from http://www.serverscheck.com/sensors/temperature_best_practices.asp

A Body Sensor Network of Man-Machine Communication: Quantum Cognitive framework for Cancer Diagnosis and Responsive Therapeutics

771 words - 4 pages are being developed based on concepts of quantum computing. A body sensor network (BSN) is basically a wireless network of wearable computing devices [31, 32] and consists of sensors, processor, transceivers and a battery [33]. These networks are now being in used for various purposes such as monitoring traffic, individual security, crops and infrastructure. The BSNs are especially brought into account within health care systems, where immediate

Soboat Technology Inc.: Information Sercurity Plan

2272 words - 10 pages drastic measures and implement an extensive information security plan to prevent this sort of incident from occurring in the future. Business Goals Sobota has defined three business goals that they would like to accomplish with their information security plan. 1. Protect their customers and their network equipment 2. Protect their employees and the company’s assets 3. Research and develop new services to provide to their customers Technology Mission

Benefits and Features of Cisco ASA 5500 Series IPS Solution

608 words - 3 pages ASA 5500 Series 4) Clients that are in need for a reliable scaled up security solution 5) Clients obliging strong security insurance without performance or security accords 6) Clients expecting to secure their remote or unified network for communication for both present and future needs. 7) Clients who prefer and trust only Cisco products for keeping their businesses up and growing. Confirming to IT solution provider Miami, following are the

Network operating systems

813 words - 4 pages . It allows for members to share data from their computer across the network. It is designed for small networks. Most desktop operating systems can act as a network operating system for a peer to peer network. . Since your desktop operating system is the network operating system this makes it much cheaper and easier. That being said it has major flaws too. Since all users have equal rights it makes for very poor security. Also there is no hub for

Similar Essays

Our World Is Filled With Sensors

1673 words - 7 pages , occupancy, smoke and fire, and security. Another example is present in our cars which contain dozens if not hundreds of sensors, monitoring the performance of the engine ,passenger safety equipment, and braking to name a few. Recently, new video camera sensor board in conjunction with the 3G module for Wasp-mote [Wasp-mote uses ZigBee, Bluetooth and Wi-Fi protocols to send low bandwidth data such as humidity, temperature, and CO2 levels, and

Innovative Field In Computer Science Research Is Wireless Sensor Networks

1688 words - 7 pages Wireless sensor networks (WSN) have emerged as one of the most exciting and innovative fields in Computer Science research over the past few years. Processors with on-board sensors nearing the size of a dust are now being developed. WSNs are a trend of the last few years due to the advances made in wireless communication and information technologies along with electronics field. A wireless sensor network (WSN) is basically a wireless network

Information Theory & Optimization For Location Of Sensors In Water Distribution For Contaminant Detection

3483 words - 14 pages . Recently, some researchers are applying GIS to manage the placement of wired and wireless sensors and sensor networks across large, and often remote geographic regions, as wells developing GIS interfaces to dynamically discover, query and task sensors within a service-oriented architecture (SOA) [2,3]. There are two types of sensing equipment (devices), which are stand alone sensors and sensors within network. Sensor network composed of node of the

Terrestrial Systems And Precision Agriculture Essay

3901 words - 16 pages . They were mainly made from manipulators, vision sensors, end effectors and locomotion devices. In general autonomous systems for agriculture should have navigation system, sensors, cameras, network interface, efficient batteries and should be acceptably safe. Guidance systems can be operator-assisted and autonomous systems. Sensor systems can be on robots, in field sensor networks and off field sensors(remote sensors). Robot can communicate with