Comprehensive architectural network design based on intrusion detection system
Author(s): Mohammad Anwar Hossain, Md. Sabbir Hossain and Rezaul Karim
Abstract: Cyber-threats on the internet abound and include ransom ware, malware, viruses, and phishing scams. Protecting against these risks, which have the potential to cause data breaches, financial losses, and reputational harm to a company, requires the implementation of network security measures. Financial information, intellectual property, and personal records are just a few examples of the sensitive and private information that many companies handle. Two essential parts of the architecture for network security are intrusion prevention systems (IPS) and intrusion detection systems (IDS). Their responsibilities in detecting and managing possible security risks are complementary. IDS keeps an eye on network activity and instantly detects any suspicious or malevolent activity. It is able to identify possible dangers before they have a chance to do a lot of harm. IPS takes things a step further by actively stopping harmful activity in addition to just detecting it. It is capable of acting quickly to halt an ongoing attack. Because of this, the authors employed IDS create a cost-effective and adaptable data security solution that any type of organization may adopt. The authors used intrusion detection (IDS) to find any unauthorized activity on the system. The unauthorized user was subsequently blocked and prevented from causing further damage to the system via the use of IDS technology.