Preview

Network Based Intrusion Prevention System (Nips)

Better Essays
Open Document
Open Document
754 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Based Intrusion Prevention System (Nips)
Network Based Intrusion Prevention System (NIPS)

Definition:

An intrusion prevention system sit in-line on the network and monitors the traffic, and when a suspicious event occurs it takes action based on certain prescribed rules. An IPS is an active and real time device, unlike an Intrusion detection system which is not inline and they are passive devices. Intrusion prevention systems are considered to be the evolution of intrusion detection system.

Alternately, an Intrusion prevention system is usually a hardware device that is connected to the network. It function is to monitor the network for nay unwanted behavior and to prevent such behavior.

A Network based Intrusion prevention system (NIPS) is used to monitor the network as well as protect the confidentiality, integrity and availability of a network.
Its main functions include protecting the network from Threats such as Denial OF Service and unauthorized usage.

Explanation:

Network based intrusion Prevention system monitors the network for malicious activity or suspicious traffic by analyzing the protocol activity. NIPS once installed in a network it is used to create Physical security zones. This in essence makes the network intelligent and it and quickly discerns good traffic from bad traffic. In other words the NIPS becomes like a prison for hostile traffic such as Trojans, worms viruses and polymorphic threats.
NIPS are manufactured using high speed Application Specific Integrated Circuits (ASICS) and network processors. A Network processor is different when compared to a micro processor. Network processors are used for high speed network traffic, since they are designed to execute tens of thousands of instructions and comparisons in parallel unlike a microprocessor which executes an instruction at a time.

NIPS are considered to be extensions of the present Firewall technologies. Firewalls inspect only the first four layers of the OSI model of any packet of information flow.

You May Also Find These Documents Helpful

  • Good Essays

    Ing Life

    • 572 Words
    • 3 Pages

    Securing Internet connection a variety of overlapping security mechanisms will be equipped to guarantee the security of the Internet connection. Common mechanisms include: firewalls, packet filters, physical security, audit logs, authentication and authorization. At the same time, technicians also need to implement packet filters to prevent the Internet routers from the DoS attacks. DoS attacks…

    • 572 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To secure the network and ensure a degree of protection from external intrusion, the first step is to ensure it is a private network and each host in the different remote locations is part of the private network; this minimizes the intrusion from public networks. Through the use of firewalls in the central computer network enforces authentication of all users in the network thus minimizing internal and external unauthorised access (Stallings, 2007).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    Firewall sits at the boundary of a network and deny traffic that breaks its rules. However, intrusion detection system has sensors throughout the network and usually only logs rule violations and traffic inside the network. It gives view of scanning and probing attempts outside of network.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cmgt/441 Week 3

    • 768 Words
    • 4 Pages

    The author makes note what the difference between a detection and prevention system is. Prevention systems automatically detect and block malicious network and application traffic, while allowing legitimate traffic to continue through to its destination. A detection system just detects and would rely on the prevention system to act on it. The prevention system is said to block bad malevolent code and cannot block good code at the same time, while allowing for protection of newer and more advanced types of security threats. The users should get to know what they weak spots of their system are in order to familiarize themselves with the dangers. Author Posey states in his article 10 best practices for Windows security, “Reduce the attack surface, the code that’s running on a machine, the greater the chance that the code will be exploitable…Uninstall any necessary operating system components and applications”, (Posey, 2011). More…

    • 768 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network design

    • 753 Words
    • 4 Pages

    The IPS with Application Level Gateway Firewall security appliance will be installed to secure the private network from the Internet and provide IPSec VPN connectivity to the main UMUC office. The Intrusion Protection System (IPS) is able to inspect network traffic, examine and filter based on information contained within the data portion of a packet. It help the IT personnel monitor, log, and detect security breaches. It could use to send security breach alerts, terminate security breaches, and terminate or restart processes.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There are a number of general strategies used to protect internal network which are evaluated below.…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    Thiel, J. (2012). IDS/IPS: An Introduction to Intrusion Detection and Prevention Systems. Retrieved on February 6th, 2013, from http://www.ece.drexel.edu/telecomm/Talks/thiel.pdf…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    It delivers instant alerts when intervention is needed. It also allows assignment of different privileges to different users through role-based administration. Reporting via web-based dashboard enables monitoring network security anywhere, anytime.…

    • 1552 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    A PROJECT REPORT SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE, SCHOOL OF SCIENCE AND TECHNOLOGY, DELTA STATE POLYTECHNIC, OZORO…

    • 10631 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    project

    • 3294 Words
    • 14 Pages

    This is to certify that the project work entitled INTRUSION DETECTION SYSTEM being submitted by BIJENDRA SINGH…

    • 3294 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    intrusion detection system

    • 2058 Words
    • 9 Pages

    Given their role they are also prime target and being managed by humans, as such they are prone to errors.  Failure of one of the above component of your security infrastructure jeopardized the system they are supposed to protect 1 8/5/2010  Not all traffic may go through a firewall  It's like security at the airport... You can put up all the fences in the world and have strict access control, but the biggest threat are all the PASSENGERS (packet) that…

    • 2058 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    [8]. Vera Marinova-Boncheva (2007)” A Short Survey of Intrusion Detection Systems”. *9+. Stefan Axelsson (1999)”Research in IntrusionDetection systems: A Survey”.…

    • 2943 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Intrusion Detection Software – features full-time monitoring tools that search for patterns in network traffic to identify intruders…

    • 839 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Intrusion detection is defined to be the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are exceeding their privileges (i.e., the insider threat). Work is being done elsewhere on Intrusion Detection Systems (IDS’s) for a single host and for several hosts connected by a network .…

    • 6146 Words
    • 25 Pages
    Good Essays