{"id":2384,"date":"2020-05-18T09:45:00","date_gmt":"2020-05-18T01:45:00","guid":{"rendered":"https:\/\/www.mdis.edu.sg\/blog\/?p=2384"},"modified":"2020-05-26T10:02:04","modified_gmt":"2020-05-26T02:02:04","slug":"detection-and-prevention-of-network-intrusion","status":"publish","type":"post","link":"https:\/\/www.mdis.edu.sg\/blog\/detection-and-prevention-of-network-intrusion\/","title":{"rendered":"Detection and Prevention of Network Intrusion"},"content":{"rendered":"\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_11 counter-hierarchy counter-decimal ez-toc-grey\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\"><i class=\"ez-toc-glyphicon ez-toc-icon-toggle\"><\/i><\/a><\/span><\/div>\n<nav><ul class=\"ez-toc-list ez-toc-list-level-1\"><li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.mdis.edu.sg\/blog\/detection-and-prevention-of-network-intrusion\/#What_is_Network_Intrusion\" title=\"What is Network Intrusion? \">What is Network Intrusion? <\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.mdis.edu.sg\/blog\/detection-and-prevention-of-network-intrusion\/#Detection_of_Network_Intrusion\" title=\"Detection of Network Intrusion \">Detection of Network Intrusion <\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.mdis.edu.sg\/blog\/detection-and-prevention-of-network-intrusion\/#Prevention_of_Network_Intrusion\" title=\"Prevention of Network Intrusion \">Prevention of Network Intrusion <\/a><\/li><li class=\"ez-toc-page-1 ez-toc-heading-level-3\"><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.mdis.edu.sg\/blog\/detection-and-prevention-of-network-intrusion\/#About_the_Author\" title=\"About the Author\">About the Author<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"What_is_Network_Intrusion\"><\/span><strong>What is Network Intrusion? <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Network Intrusion is recognised as an unauthorised activity. These are the activities that jeopardise the network security and the data available on the network. \u00a0These days, mostly the new companies and the online brands get attacked. To avoid these attacks, the companies must maintain a team of cybersecurity professionals who can detect and prevent such harmful attacks.\u00a0 <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"507\" height=\"286\" src=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_2.jpg\" alt=\"Attacking Techniques of Network Intrusion\" class=\"wp-image-2386\" srcset=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_2.jpg 507w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_2-300x169.jpg 300w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_2-400x226.jpg 400w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/figure>\n\n\n\n<p>1. Multi-Routing: This is the method which is also called\nasymmetric routing. It makes more than a single route over the network that is\ntargeted. In this way, the hackers detect a very important portion of the\nnetwork. <\/p>\n\n\n\n<p>2. Buffer Overflow Attacks: This is a type of attack which\noverwrites various sections of the memory of a computer present in a network.\nIt replaces the normal data present in a particular location with a command\nstring which is later used for the attack. However, this technique is difficult\nto attack if there are boundary checking logic that can identify the codes. <\/p>\n\n\n\n<p>3. Furtive Common Gateway Interface Scripts: The CGI (Common\nGateway Interface) helps to make the interaction between the servers and the\nclients. This is the server that easily provides intruders access the file\nwhich is available on the web. <\/p>\n\n\n\n<p>4. Protocol-Specific Attacks: All the devices maintain a\nlist of rules at the time of performing various activities in the network. In\nthis case the protocols including IP, ICMP leave certain loopholes that help in\nperforming the attack.&nbsp; <\/p>\n\n\n\n<p>5. Traffic Flooding: It creates the load of traffic and thus\nthe system fails to screen properly. <\/p>\n\n\n\n<p>6. Trojan Horse Malware: It creates a backdoor of the\nnetwork and the attackers get access to the network and available data. <\/p>\n\n\n\n<p>7. Worms: This a very easy way for network intrusion. They\nseek out the information from the network and the systems and transfer the data\nout from the network. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"569\" height=\"294\" src=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_3.jpg\" alt=\"Intrusion Detection System\" class=\"wp-image-2387\" srcset=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_3.jpg 569w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_3-300x155.jpg 300w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_3-400x207.jpg 400w\" sizes=\"(max-width: 569px) 100vw, 569px\" \/><\/figure>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Detection_of_Network_Intrusion\"><\/span><strong>Detection of Network Intrusion <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The Network Intrusion is detected with the help of the\nIntrusion Detection System (IDS). For the detection process, two methods may be\nused: <\/p>\n\n\n\n<p>1. Signature-Based Method: In this method, the attacks are\ndetected by the traffic on the network and also identifies the instruction\nsequence which is very common to a specific malware. The pattern in which it\ndetects is called the signature. <\/p>\n\n\n\n<p>2. Anomaly-Based Method: It uses machine learning to make an\nactivity model. Any new behaviour is compared with this model and any malicious\npotential declared. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"545\" height=\"265\" src=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_4.jpg\" alt=\"Intrusion Prevention System\" class=\"wp-image-2388\" srcset=\"https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_4.jpg 545w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_4-300x146.jpg 300w, https:\/\/www.mdis.edu.sg\/blog\/wp-content\/uploads\/2020\/05\/Mar_4-400x194.jpg 400w\" sizes=\"(max-width: 545px) 100vw, 545px\" \/><\/figure>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"Prevention_of_Network_Intrusion\"><\/span><strong>Prevention of Network Intrusion <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The Network Intrusion is prevented with the help of the\nIntrusion Prevention System (IPS). To prevent the intrusion, four types of\nsystems may be used: <\/p>\n\n\n\n<p>1. Network-Based Intrusion\nPrevention System: It scans the whole of the network. <\/p>\n\n\n\n<p>2. Wireless Intrusion Prevention\nSystem: With the help of wireless network protocols it monitors the activities.\n<\/p>\n\n\n\n<p>3. Network Behaviour Analysis: It\nobserves the traffic of the network. <\/p>\n\n\n\n<p>4. Host-Based Intrusion\nPrevention System: It monitors the single host in case of any suspicious\nactivity. <\/p>\n\n\n\n<p>There are several reputed organisations, whose networks can be attacked at any point in time. So, these organisations must hire cybersecurity professionals on cybersecurity who can monitor the networks and save them from any attacks. Important links: <\/p>\n\n\n\n<p><strong>References <\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/patents.google.com\/patent\/US20180324200A1\/en\" class=\"rank-math-link\">https:\/\/patents.google.com\/patent\/US20180324200A1\/en<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.4108\/eai.3-12-2015.2262516\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">https:\/\/dl.acm.org\/doi\/pdf\/10.4108\/eai.3-12-2015.2262516<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/patents.google.com\/patent\/US20190319821A1\/en\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">https:\/\/patents.google.com\/patent\/US20190319821A1\/en<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/arxiv.org\/abs\/1901.02672\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">https:\/\/arxiv.org\/abs\/1901.02672<\/a><\/p>\n\n\n\n<h3><span class=\"ez-toc-section\" id=\"About_the_Author\"><\/span>About the Author<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>I am Raju Uma Maheshwari from <a href=\"https:\/\/www.mdis.edu.sg\/school-of-technology\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">School of Technology<\/a> pursuing the <a href=\"https:\/\/www.mdis.edu.sg\/higher-diploma-in-ethical-hacking-and-forensic-investigations-countermeasures\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Higher Diploma in Ethical Hacking and Forensic Investigation Countermeasures<\/a>. Before starting my course at MDIS I was working as a Manager of Macdanal Granites Pte Ltd, and prior to that I was teaching at a primary school in a small town in Tamil Nadu, India.\u00a0 There was always a plan B for my career development. This plan is to become a professional cybercrime officer. This driving force led me to choose the higher diploma in ethical hacking and forensic investigation countermeasures for my career. <\/p>\n\n\n\n<p>The Management Development Institute of Singapore (MDIS) has a distinctive presence of its own which is attributed to its rich legacy and tradition of excellence. In pursuing my dream of becoming a <a href=\"https:\/\/www.ncpc.org.sg\/cybercrime.html\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">cybercrime<\/a> and forensic investigator, MDIS has given me an opportunity to make my dream come true.\u00a0 I enjoy my study at MDIS, the class interactions, teacher\u2019s encouragement in addressing our study concerns and new friends.\u00a0\u00a0 I am sharing an article on \u201cThe Detection and Prevention of Network intrusion\u201d for users\u2019 benefit. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of Contents What is Network Intrusion? Detection of Network Intrusion Prevention of Network Intrusion About the Author What is Network Intrusion? Network Intrusion is recognised as an unauthorised activity. These are the activities that jeopardise the network security and the data available on the network. \u00a0These days, mostly the new companies and the online brands get attacked. To avoid these attacks, the companies must maintain a team of cybersecurity professionals who can detect and prevent such harmful attacks.\u00a0 1. Multi-Routing: This is the method which is also called asymmetric routing. It makes more than a single route over the [&hellip;]<\/p>\n","protected":false},"author":283,"featured_media":2385,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2384"}],"collection":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/users\/283"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/comments?post=2384"}],"version-history":[{"count":1,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2384\/revisions"}],"predecessor-version":[{"id":2389,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/posts\/2384\/revisions\/2389"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/media\/2385"}],"wp:attachment":[{"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/media?parent=2384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/categories?post=2384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mdis.edu.sg\/blog\/wp-json\/wp\/v2\/tags?post=2384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}