IT 244 Week 8 - DQ 1 - 7782

Solution Posted by
3number
Solution Detail
Price: $2.00
  • From: ,
  • Posted on: Fri 13 Apr, 2012
  • Request id: None
  • Purchased: 0 time(s)
  • Average Rating: No rating
Request Description

IDS, Intrusion detection system is a software/hardware that is designed to spot unwanted attempts at manipulating, accessing, and disabling computer systems.  This is done mainly by a network such as the internet.  Misuse intrusions are attacks on fragile parts of a system which can be spotted by pattern matching since they follow well defined patterns.  A set of rules determines what a misuse is. Anomaly intrusions occur within a system that is outside the normal behavior.  This is considered to be the hardest to determine out of the two classes of intrusions. 

An IDS that is good will keep running to decide if any intrusions are happening and if so what type are they.  The Intrusion detection system must always be up to date by having system, hardware, and software upgrades.  An IDS must never fail.

When I looked up the DShield.org website, I noticed the Trojan Opachki’s.  This Trojan’s main objective is to take over links; it hooks the send and receives API calls in the following method:

Programs: FIREFOX.EXE, IEXPLORE.EXE, OPERA.EXE and QIP.EXE.  Actually the QIP.EXE is an ICQ client that has become very famous in Russia.  It seems like the Trojan has a component that strikes Russian users directly

 

 

Solution Description

IDS, Intrusion detection system is a software/hardware that is designed to spot unwanted attempts at manipulating, accessing, and disabling computer systems.  This is done mainly by a network such as the internet.  Misuse intrusions are attacks on fragile parts of a system which can be spotted by pattern matching s