The Repository @ St. Cloud State

Open Access Knowledge and Scholarship

Date of Award


Culminating Project Type

Starred Paper

Degree Name

Information Assurance: M.S.


Information Assurance and Information Systems


Herberger School of Business

First Advisor

Dennis Guster

Second Advisor

Lynn Collen

Third Advisor

Balasubramanian Kasi

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Keywords and Subject Headings

Intrusion detection systems


Most of the devices and systems nowadays are complex connected devices that perform critical functions. Security in these devices is a critical task and of the highest importance. The protection of the data is mandatory for any organization, so there is a demand for the security mechanism to protect the data. Security is a challenging issue that should be taken into consideration when designing and building business-based web applications, as well as during its maintenance stage. Security can be provided to a system in various ways at different layers. This can be done either by an Intrusion Prevent System (IPS) or Intrusion Detection Systems (IDS). Usually deployed in a network to monitor the traffic, these systems use their own methodology to prevent, mitigate, and arrive at conclusions.

The main objective of the paper is to discuss various kinds of IPS/IDS in detail, and their uniqueness which makes them stand out for various reasons. An additional discussion point will indicate which IDS/IPS can be used according to the security requirement, their functionality, and performances with their effectiveness to stop the malicious activity over a computer network. Reasons to choose a specific IDS/IPS will be listed. One of the high-level objectives of the paper is to create awareness about the availability of IDS/IPS and information on which one to choose for their requirements.