Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Advanced Digital Forensic Investigations, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
IDS/IPS Practices
Security is an essential factor in every aspect of life. Likewise, it is related to every activity, process, procedures, technologies, methods, decisions etc. In the context of information technology, again, security has a significant impact on every process or procedure related to information exchange, acquisition, transfer or maintenance. As we are in the information age, manual processes are transformed in to a digital form. Likewise, information is digitized and is handled by security technologies. Traditional technological devices related to information security are a firewall. Organizations possessing information in a digitized form, must install a firewall, otherwise, it is impossible to secure the digital information located in the information systems. Previously, firewall was giving answers for security, but in the information age, where information is widespread in millions of systems worldwide and also includes interfaces via which users have to access the information, it is impossible to incorporate a single firewall, as an all-in-one solution for information security. Moreover, threats are far more significant and intelligent as compared to the previous. Hackers develop threats that are efficient in bypassing firewalls and compromise networks and consequently, intrusion/host/network intrusion detection systems were introduced. These security appliances provide advanced monitoring and sensing facilities that may alert concerns before an incident takes place. A complete and comprehensive definition of an IDS is available in network dictionary which says “set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack. Intrusion detection is very tricky. Too much analysis can add excessive overhead and also trigger false alarm”
Activities
In order to cope up with the configuration aspects, network engineers or users have to follow a criterion. Likewise, for monitoring internal or external events that may lead to an identification of threats, procedural steps must be considered for effective monitoring. However, these steps can be duplicated (Paquet, n.d):
- Procedures for denying inline attacker: inline attacker is referring to a threat that may come from a wireless source that may try to intrude in the system at a particular time and will also demonstrate the processes that are triggered for removing the threat from the network, in case of a compromise. Moreover, the likelihood of inbound and outbound attacks will facilitate the network engineer to identify the methods, technology and algorithms that are integrated in the threat by the creator.
- Procedures for denying inline connection: this procedure provides the transmission control protocol (TCP) stream for both inbound and outbound channels of data transmission. The provision of these streams on the application layer will provide the indication of an attack that is using any one of these streams and consequently, network engineers will terminate the relevant stream.
- Procedures for denying packet inline: network engineers can set the criteria that will be stated as ‘any data packet that is originating from a wireless stream will be terminated it any anomaly is detected against it’ .Therefore, any data packet from a wireless network, behaves abnormally will be terminated or destroyed.
- Procedures for Log attacker packets: for detecting suspicious packets, logs must be maintained and alerts will be generated as per the defined criteria.
- Procedures for Log pair packets alignment: Apart from the above procedure, network engineers can also log the entries against the source and the affected workstation or system.
- Procedures for block connection request: After analyzing all the procedures, IDS will instruct the firewall to block a suspicious data stream that is already evaluated and identified.
- Procedures for blocking host: this procedure is similar to the above one except blocking the access of the host, if identified, instead of blocking a data stream.
Snort
Snort will allow the network engineers to construct a foundation of a tracing mechanism within the network that will organize raw data packet collection from all interfaces. ‘Lipcap’ provides a preprocessing mechanism that is located in the decoder of a data packet (Kumar, Bhaskari, Avadhani, & Kumar, 2010). Preprocessor makes these data packets compatible for applying rules (packet defragmentation), detecting engine and examine headers for generating alerts related to any suspicious activity originating from a wireless network source.
Only those protocol rules will be applied that are currently operational by a hacker and the detection engine will acts on the basis of defined criteria for a specific rule. Furthermore, collection engine in Snort will organize information from the source that will acts as an input for digital forensic investigations (Kumar, Bhaskari, Avadhani, & Kumar, 2010).
Windump
This tool is used to identify any malwares that may reside in any workstation or server within the network. Moreover, it also provides identification of unknown broadcasting that may occur in case of an active malware trying to send any confidential information to the hacker. Likewise, the tool also represents the IP addresses that are translated from the information retrieved from packet headers. However, there is a limitation i.e. windump only provides information that is associated with secure socket layer (SSL)
References
Ids. (2011). Computer Desktop Encyclopedia, , 1.
Paquet, C.Implementing cisco IOS network security (IINS): (CCNA security exam 640-553) (authorized self-study guide) Cisco Press.
Kumar, T. P., Bhaskari, L., Avadhani, P., & Kumar, P. V. (2010). Digital evidence collection in cyber forensics using snort. Proceedings of the International Conference on Information Warfare & Security, , 216-222.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee