首页> 外文期刊>International journal of computer science and network security >Intrusion Prevention Systems: Architectures and Tools
【24h】

Intrusion Prevention Systems: Architectures and Tools

机译:入侵防御系统:架构和工具

获取原文
           

摘要

Cyber security is an ever-heated topic as the rate of cyber-crime has increased significantly in the last few years. According to a report released by the University of Maryland in 2018 that cyber-attacks are happening on a “near constant time”. The study stated that there is approximately one attack every 39 seconds on every computer in the world. The estimated total cost of cyber-crime is over $1 trillion dollars in 2018 and is expected to exceed $2 trillion in 2019 [2]. These facts have exerted an enormous pressure on governments, organizations and individuals worldwide to pacify, detect, and prevent those attacks. Intrusion prevention Systems (IPS) are central to computer and network cyber security. Despite the use of firewalls and virus scans, many attacks make it to the network largely due to human errors [3]. IPSs work on real-time to detect and take a defensive measure before the malware makes its way through the computer or the network. The way IPSs work is that they scan the incoming and the outgoing packets to/from computers or networks on real-time. If a suspicious packet is detected its either dropped or the entire connection is terminated. There are various ways/techniques used by IPSs to scan the data. In this work we will discuss the signature, the profile, and the stateful protocol methods. We will also discuss the deployment of those prevention methods, weather on a host, on a network or as wireless IPS. At the end of this work we will be reviewing the available systems for IPSs including the open-source ones. Examples of such systems include Snort, OSSEC, and Suricata. A comparison of those systems and their pros and cons will be included.
机译:网络安全是一个永久性的话题,随着网络犯罪率在过去几年中显着增加。根据马里兰大学发布的一份报告,2018年,网络攻击正在发生“近持续时间”。该研究表明,世界上每台电脑都有大约一次攻击每39秒。估计2018年的网络犯罪总成本超过1万亿美元,预计2019年将超过2万亿美元[2]。这些事实对全球范围内的政府,组织和个人进行了巨大的压力,以安抚,检测和防止这些袭击。入侵防御系统(IPS)是计算机和网络网络安全的核心。尽管使用防火墙和病毒扫描,但许多攻击在很大程度上由于人为错误而使其成为网络[3]。 IPSS在实时工作以在恶意软件通过计算机或网络进行操作之前检测和采取防御性度量。 IPSS工作的方式是,他们实时将传入和从计算机或网络扫描到/从计算机或网络扫描。如果检测到可疑数据包,则其删除或终止整个连接。 IPS使用各种方式/技术来扫描数据。在这项工作中,我们将讨论签名,配置文件和有状态协议方法。我们还将讨论这些预防方法的部署,在网络上或无线IPS上的主机上的天气。在本工作结束时,我们将审查IPS的可用系统,包括开源。这种系统的示例包括Snort,Ossec和Suricata。将包括这些系统及其利弊的比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号