Next Generation Intrusion Protection Systems

94 views 2 pages ~ 368 words Print

There has been improvement in IDS/IPS over time due to improvements in hacking skills by hackers. This has involved introductions of; stepping up IPS from 1 or 2 Gbps upto40 to 50 Gbps which provides the ability to monitor several segments of the network (Pirc, 2017). This eliminates one way attackers from gaining access and control of user’s computer.

Another means by which hackers accessed user’s system was by redirecting users to popular website which then directs users to hackers’ site; this was done by iFrame redirects (Pirc, 2017). This required IDS/IPS vendors to provide countermeasures of blocking malicious command & control IP addresses as well as websites that were known to host malware by reducing the time it takes to detect threats.

The creation of Next Generation Intrusion Prevention Systems (NGIPS) includes features like application and control that detects network traffic for known attack signatures and their alerts (Savage & Forgaty, 2017). It also stops the attack from proceeding into the user’s network counting on how it is deployed.

There are also advanced persistent threats resulting from phishing attacks from documents tainted with malwares (Savage & Forgaty, 2017). This has been addressed by introduction of devices with sandboxing and or emulation capabilities.  Sandboxing addresses the ability to find a zero-day malware as traffic that contained executable documents from web or email are forwarded to Breach Detection System.

Bad files sent to the administrator as being malicious MD5/SHA checksum (Pirc, 2017). It is the checksum that verifies the integrity of these files and text messages. Therefore if checksum that enters the network is similar to the one that is on vendor’s file then sandbox alerts the administrator about the malware in the network.

Currently used detection system is the Next Generation Firewalls (NGFWs) as organizations will no longer need to buy and manage several devices unlike previously.

The hackers’ threats are gradually changing and thus security promoters are concentrating on high accuracy modifications to detection systems.

References

Savage, M. and Forgaty, S. (2017). 5 Benefits of Next-Generation Firewalls. Retrieved on August 6, 2018 from:  https://www.networkcomputing.com/networking/5-benefits-next-generation-firewalls/57886367

Pirc, J. (2017). The Evolution of Intrusion Detection/Prevention: Then, Now and the Future. Retrieve on August 6, 2018 from: https://www.secureworks.com/blog/the-evolution-of-intrusion-detection-prevention

September 11, 2023
Subject area:

Security

Number of pages

2

Number of words

368

Downloads:

51

Writer #

Rate:

4.4

Expertise Security
Verified writer

I needed an urgent paper that had to be done in 5 hours only. I kept looking for help, and it was Kelly who has helped me. Amazing attitude and stellar writing that contained no mistakes.

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro