Culminating Project Title
Date of Award
Culminating Project Type
Information Assurance: M.S.
Information Assurance and Information Systems
Herberger School of Business
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.
Keywords and Subject Headings
Intrusion detection systems
Most of the devices and systems nowadays are complex connected devices that perform critical functions. Security in these devices is a critical task and of the highest importance. The protection of the data is mandatory for any organization, so there is a demand for the security mechanism to protect the data. Security is a challenging issue that should be taken into consideration when designing and building business-based web applications, as well as during its maintenance stage. Security can be provided to a system in various ways at different layers. This can be done either by an Intrusion Prevent System (IPS) or Intrusion Detection Systems (IDS). Usually deployed in a network to monitor the traffic, these systems use their own methodology to prevent, mitigate, and arrive at conclusions.
The main objective of the paper is to discuss various kinds of IPS/IDS in detail, and their uniqueness which makes them stand out for various reasons. An additional discussion point will indicate which IDS/IPS can be used according to the security requirement, their functionality, and performances with their effectiveness to stop the malicious activity over a computer network. Reasons to choose a specific IDS/IPS will be listed. One of the high-level objectives of the paper is to create awareness about the availability of IDS/IPS and information on which one to choose for their requirements.
Mutyala, Priyanka, "Comparison of Intrusion Detection Systems/Intrusion Prevention Systems – A Selection Criterion" (2018). Culminating Projects in Information Assurance. 49.