RESPOND TO THIS DISCUSSION POST BASED ON THE TOPIC “Compare and contrast the different types of IDPS technology and describe any prior experience using any of the tools.”

 1.VC).  I have found four different types of IDPS technologies but for this discussion board I decided to just compare two. The first IDPS technology is network-based. A network-based technology “monitors network traffic for particular network segments or devices and analyzes the network and application protocol activity to identify suspicious activity.” (Scarfone, 2007) A network based system is used to capture and analyze packets from various IP addresses, websites, and TCP/UDP layers. One benefit of having a network-based detection system in place is getting real time alerts. Also, companies can decide which type of network based system they would like to go with. There are two major types: signature-based which compares attacks with previous attacks the system has seen. The second type is anomaly-based which compares packets with a baseline and then decides which steps should be taken. Overall, a network-based IDPS can be expensive and difficult to configure.

Haven’t Found The Relevant Content? Hire a Subject Expert to Help You With
Post Your Own Question And Get A Custom Answer
Hire Writer

The second type of IDPS is known as a network behavior analysis system which “examines network traffic or statistics on traffic to identify unusual traffic slows, and policy violations.” (Scarfone, 2007) Unlike a network-based IDPS the NBA system is delayed in identifying attacks. Although an NBA system can analyze and reconstruct an attack in hopes to prevent the same type of attack from happening again.  Also, NBA systems are used to monitor the network flow or malware rather than monitoring the actual network itself.  Using Snort for this week’s lab will be my first time using an intrusion detection software.

2TD).  I really like this topic although it can be a very extensive one. There are many forms of IDPS systems. “. “Intrusion Detection System (IDS) is meant to be a software application which monitors the network or system activities and find if any malicious operations occur.” (1)  Unlike firewalls that block any connections that it finds harmful, this software alerts the administrator if any connections that were harmful still get passed through. There are three types of Intrusion Detection Systems: Network Based, Host Based and Application Based.

“Network-based intrusion detection systems monitor the network traffic and use these raw network packet’s content to analyze network, transport, and application protocols to identify suspicious activity.” (2) This system collects all the packets through the network and analyzes them for any malicious intent. One advantage of using this method is the “operating system independence.” The data packets “also independent on OS platform. This method is to provide faster notification and response…” (2)  

Another type of Intrusion Detection Systems is the Host based. “Host-based IDS monitors a single machine and audits data traced by the hosting operating system. When there is any file change, the IDS compare the new signatures by hashing new log entry to see whether there is a match.” (2) This is when the system alerts the administrator if there is a match as there can be a security issue.

Application Based IDS is to basically solve the “weakness of the Network IDS. One big advantage of this approach is to monitor the interaction between user and application, which traces activity to individual users.” (2) Since this IDS traces the actions back to individuals, it will be clear who tries to project harm.

I did find another site that I found useful as it tells the ways IDPS detects attacks. ” A signature is a pattern that corresponds to a known attack or type of attack. Signature-based detection is the process of comparing signatures against observed events to identify possible attacks.” (3) This is when something is labeled with known labels that are forms of malware. ” Signature-based detection is very effective at detecting known attacks but largely ineffective at detecting previously unknown attacks, attacks disguised by the use of evasion techniques, and many variants of known attacks.” (3) 

” Anomaly-based detection is the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. An IDPS using anomaly-based detection has profiles that represent the normal behavior of such things as users, hosts, network connections, or applications.” (3) This is when monitoring changes happens. If something changes over time. it is detected this way. ” The major benefit of anomaly-based detection methods is that they can be very effective at detecting previously unknown attacks.” (3) 

” Stateful protocol analysis is the process of comparing predetermined profiles of generally accepted definitions of benign protocol activity for each protocol state against observed events to identify deviations.” (3) This is when events that have happened are compared to those that are normal. It is then decided if they are normal deviations or abnormal. 

3. CHL).  According to NIST, there four primary types of IDPS technologies: Network based, wireless, network behavior analysis, and host based. 

  • Network-Based,

o    Monitors network traffic for particular network segments or devices and analyzes the network and application protocol activity to identify suspicious activity.

o    Identifies many different types of events of interest.

o    Most commonly deployed at a boundary between networks.

  • Wireless,

o    Monitors wireless network traffic and analyzes its wireless networking protocols to identify suspicious activity involving the protocols themselves.

o    Cannot identify suspicious activity in the application or higher-layer network protocols (e.g., TCP, UDP) that the wireless network traffic is transferring.

o    deployed within range of an organization’s wireless network

o    Can also be deployed to locations where unauthorized wireless networking could be occurring.

  • Network Behavior Analysis (NBA),

o    Examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware (e.g., worms, backdoors), and policy violations (e.g., a client system providing unauthorized network services to other systems).

o    Most often deployed to monitor flows on an organization’s internal networks, and are also sometimes deployed where they can monitor flows between an organization’s networks and external networks

  • Host-Based

o    Monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

o    Most commonly deployed on critical hosts such as publicly accessible servers and servers containing sensitive information (NIST. n.d.).

I have used probably all but wireless, though I may have inadvertently used it.  I have not seen wireless IDPS much because most of my experience comes from non-wireless forms of networking.  As mentioned in the previous discussion, I would stay away from wireless unless I have to due to security concerns. 

NIST. (n.d.). Intrusion Detection and Prevention Systems [PDF].


Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:3 PAPARAGRAPHS FOR EACH PROMPT ANSWER. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
  • What if I’m dissatisfied with the paper I get?

    The average quality score at our professional custom essay writing service is 8.5 out of 10. The high satisfaction rate is set by our Quality Control Department, which checks all papers before submission. The final check includes:
    • Compliance with initial order details.
    • Plagiarism.
    • Proper referencing.
    If for some reason we happen to leave a mistake unnoticed, you are invited to request unlimited revisions of your custom-written paper. For more information, check our Revision Policy. We will do our best to make your experience with Familiar Essays enjoyable.
  • I need an essay on the same day. Is it something you can do?

    Sure. Our writing company offers a fast service with an 8-hour deadline for orders up to master’s level. Make sure to specify the deadline in the order form and our writers will write a paper within the indicated timeslot. Just proceed to submit your requirements here Once you order a custom-written essay, our managers will assign your order to the well-suited writer, who has the best skills and experience for preparing your specific assignment. You can also request one of these extra features:
    • Choose the Writer’s Samples option – study 3 randomly-provided pages from orders that have been written by the assigned writer.
    • Request a specific writer – choose an academic writer from the dropdown list in the order’s form (optional for returning customers).
    You can be sure that your custom writing order will be accomplished by one of our 400+ professional academic writers. They all pass a series of tests to prove their writing prowess and hold the reputation of being the most professional in the industry. Want to make sure writer’s skills match your needs? Get more details on how to choose the appropriate author.
  • How can I be sure your writing service is not a scam?

    We understand that a shade of mistrust has covered the paper writing industry, and we want to convince you of our loyalty. Apart from high-quality writing services, we offer:
    • The chances of students to boost writing skills in a quick and effective way.
    • The opportunity to manage studies and free time in an enjoyable manner.
    • The possibilities to improve overall academic performance.
    Our custom writing company has been working for more than 12 years and always puts quality and clients’ needs first. Our operations are legally documented, we are easily accessible online and offline,
  • Is it legal to use your professional writing service?

    Yes. Custom writing help is not prohibited by any university or college. It’s a 100% legal way of getting professional assistance with paper writing. Hiring writers from an essay writing company is in many ways similar to consulting a tutor – we help you solve the writing issues at hand.
  • How does your service work?

    Our custom writing service is a reliable solution on your academic journey that will always help you if your deadline is too tight. You fill in the order form with your basic requirements for a paper: your academic level, paper type and format, the number of pages and sources, discipline, and deadline. Then, you describe the specific details of the paper you need: add the topic, write or paste the instructions, and attach files to be used, if you have them. After that, an online customer support representative chooses the best writer that specializes in your discipline and assigns him or her to complete the paper according to your requirements. When the paper is ready, we check it for plagiarism and send it to you. If you want to change something, you can request a free revision.
See full FAQ

Take your studies to the next level with our experienced specialists

Live ChatWhatsApp