Intrusion Detection And Rapid Action Essay

947 Words2 Pages

Name: Krishna Teja Lingala, CSU Id:2608866. Intrusion Detection and Rapid Action Intrusion Detection and Rapid Action (INDRA) is a distributed scheme.Based on this scheme two trusted peers sharing information, to avoid the intrusion attempts on network.Using computer system or computer resources the act or attempted act, without any requisite privileges causing willful incidental image is called as Intrusion. Intrusion is primarily network based activity. In real time, the computer programs that are compared observable behavior against suspicious elements to detect the intrusion are Intrusion Detection Systems (IDS).Based on several factors, intrusion detection systems are classified as so many types.Depends on response these systems are either passive or else active systems.In passive systems only identification of intrusion is done only.But in active intrusion detects the intrusion and takes some action to prevent the intrusion. Depending on source on audit data intrusion detection systems are two types.In the network data systems, the network data is tested for example network packets.But in Host data systems host data is examined.Examples for host data intrusion detection systems are application logs, system call traces.Based on data collection and process, intrusion detection systems are may be centralized are distributed. Each host on P2P network works on special security daemon and Indra daemon.the P2P network requires reliability and trusted network.A,B & C are three hosts in P2P network. Attackers find weak access point on B.Attacking starts at host B, which is connected to C.At host C, intrusion detection system det... ... middle of paper ... ... congestion collapse are solved by timer improvements and congestion control mechanism in modern implementations of TCP. The potential congestion collapse is one form of congestion collapse, this occurs due to undelivered packets.Just before of reaching final destination,the packet is dropped in the network then wastage of bandwidth occurs.This is due to open-loop applications are not using end-to-end congestion control. If flow arrival rate is not exceeds the arrival of conformable TCP connection in the same conditions,then the flow is TCP friendly. The requirement of end-to-end congestion control,and requirement of router mechanisms in network to identify and avoid unresponsive and high bandwidth best effort flows in times of congestion. References: (1) “Promoting the use of End-to-End congestion Control in the internet”, Sally Floyd and Kevin Fall.

More about Intrusion Detection And Rapid Action Essay

Open Document