SlideShare a Scribd company logo
Intrusion Detection Systems
Objectives
In this lab, students will examine the following objectives.
Differentiate the use of IDS and IPS to detect network attacks
Design a network with IDS/IPS.
Justify the use of IDS/IPS for a given network solution.
Scenario
A small company is using the topology shown below to secure
its intranet while provides a less-secured environment to its
eCommerce DMZ server. The company is concerned firewalls
are not enough to detect and prevent network attacks.
Hence, deployment of sensors to Intrusion detection systems
(IDS) and/or intrusion prevention systems (IPS) are needed in
the network.
Your job is to provide recommendations including a network
design with IDS/IPS that meet company’s requirements.
Initial Topology
Company’s Requirements
Detect any malicious traffic entering the ecommerce server
without performance penalty to traffic getting in the server from
revenue-generating customers.
Stop any malicious traffic entering the human resources LAN
(HR LAN).
Detect any malicious traffic entering the computer terminal in
the marketing LAN (MKT LAN).
Stop any traffic entering the File Server in MKT LAN.
Deploy a centralized database and analysis console in the
intranet to managing and monitoring both; IDS and IPS sensors.
Note:
RED
text indicates the required questions to answer
Task 1—Layout the New Network Design
Click on the
Initial Network Topology
link at iLab tab in week 7, and save in your computer the power
point file
Initial_Network_Topology_iLab7.ppt
.
This file contains a diagram for the initial network topology and
pictures of all components needed to create the new network
design.
Review the documentation provided in the references at the end
of this instructions, to get more familiar with the
implementation of IDS and IPS in network design.
You need to find a network solution that meets company’s
requirements.
#1.
Paste below your new network design diagram.
Task 2—IDS/IPS Recommendations
#2.
Write an engineering specification document of at least 250
words (e.g. 1 page of full text, double space & size 12)
describing why your networks design meets each of the
company’s requirements. Justify how each recommendation
addresses the company’s needs.
Task 3—
Conclusions
#3.
Describe in two paragraphs your learning experience in this lab.
Intrusion Detection Systems Objectives In this lab, st.docx

More Related Content

DOCX
IT 200 Network DiagramBelow is the wired network configurat.docx
PDF
En35793797
DOCX
1 SDEV 460 – Homework 4 Input Validation and Busine
DOCX
BMIS 520IT Infrastructure Project Designing LAN Networks Assign
PDF
Experimental Based Learning and Modeling of Computer Networks
PDF
Cybersecurity 365 FREE PPT ___ 30May2025
PDF
computer networks
IT 200 Network DiagramBelow is the wired network configurat.docx
En35793797
1 SDEV 460 – Homework 4 Input Validation and Busine
BMIS 520IT Infrastructure Project Designing LAN Networks Assign
Experimental Based Learning and Modeling of Computer Networks
Cybersecurity 365 FREE PPT ___ 30May2025
computer networks

Similar to Intrusion Detection Systems Objectives In this lab, st.docx (20)

DOCX
CIS337– Networking in Business Unit 6 Assignment Final
DOCX
01-01-2017 This section will lay out the implementation plan o.docx
PDF
Isset Presentation @ EECI2009
DOCX
Cis 175 Success Begins / snaptutorial.com
DOCX
Cis 175 Enthusiastic Study / snaptutorial.com
DOCX
Network Design for a company
DOCX
Assignment ContentAfter reviewing your latest submission, the .docx
DOCX
Cis 534 Technology levels--snaptutorial.com
DOCX
Cis 534 Enthusiastic Study / snaptutorial.com
PDF
181472589 basis project report
DOCX
Documentation
PDF
List and describe various features of electronic systems.List and .pdf
DOCX
Assignment 3 TCSS 143 Programming Assignment 3 .docx
PDF
Cisco project ideas
PDF
Network security projects
DOCX
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
DOCX
PLEASE READ ALL REQUIREMENTS BEFORE SUBMITTING A BID PLEASE
DOC
Cis 175/tutorialoutlet
PDF
CMIT 320 FINAL PROJECT NETWORK SECURITY.
PDF
Cisco Connect 2018 Thailand - Data center transformation emerging trends and ...
CIS337– Networking in Business Unit 6 Assignment Final
01-01-2017 This section will lay out the implementation plan o.docx
Isset Presentation @ EECI2009
Cis 175 Success Begins / snaptutorial.com
Cis 175 Enthusiastic Study / snaptutorial.com
Network Design for a company
Assignment ContentAfter reviewing your latest submission, the .docx
Cis 534 Technology levels--snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
181472589 basis project report
Documentation
List and describe various features of electronic systems.List and .pdf
Assignment 3 TCSS 143 Programming Assignment 3 .docx
Cisco project ideas
Network security projects
Running head NETWORK DESIGN PROPOSALNETWORK DESIGN PROPOSAL.docx
PLEASE READ ALL REQUIREMENTS BEFORE SUBMITTING A BID PLEASE
Cis 175/tutorialoutlet
CMIT 320 FINAL PROJECT NETWORK SECURITY.
Cisco Connect 2018 Thailand - Data center transformation emerging trends and ...

More from doylymaura (20)

DOCX
Inventory Management Homework Set  You work in the administrat.docx
DOCX
Inventory Costing Methods Please respond to the followingUse.docx
DOCX
Inventory Costing Methods Please respond to the followingUse th.docx
DOCX
Introduction Understanding culture is essential for effectively ex.docx
DOCX
Inventory Management Homework Set You work in the .docx
DOCX
IntroductionI am 43 years old and married with three childre.docx
DOCX
IntroductionThroughout this course, the breadth and depth of you.docx
DOCX
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
DOCX
IntroductionPatients usually go through a lot and in most inst.docx
DOCX
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
DOCX
IntroductionIn this module, you have learned about the intention.docx
DOCX
IntroductionBody part (literature review) which includesT.docx
DOCX
Introduction to SociologyAll work must be original in APA Format, .docx
DOCX
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
DOCX
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
DOCX
Introduction One or two pages to introduce the issue, group, or.docx
DOCX
Introduction on Islamic philosophy In order to write about evolut.docx
DOCX
Introduction to Assignment This assignment contains a number of s.docx
DOCX
Introduction to Assignment This assignment contains a number .docx
DOCX
Introduce us to a person (historical or fictional) with whom you are.docx
Inventory Management Homework Set  You work in the administrat.docx
Inventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse th.docx
Introduction Understanding culture is essential for effectively ex.docx
Inventory Management Homework Set You work in the .docx
IntroductionI am 43 years old and married with three childre.docx
IntroductionThroughout this course, the breadth and depth of you.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPatients usually go through a lot and in most inst.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
IntroductionIn this module, you have learned about the intention.docx
IntroductionBody part (literature review) which includesT.docx
Introduction to SociologyAll work must be original in APA Format, .docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
Introduction One or two pages to introduce the issue, group, or.docx
Introduction on Islamic philosophy In order to write about evolut.docx
Introduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number .docx
Introduce us to a person (historical or fictional) with whom you are.docx

Recently uploaded (20)

PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Complications of Minimal Access Surgery at WLH
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Cell Structure & Organelles in detailed.
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
A systematic review of self-coping strategies used by university students to ...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Complications of Minimal Access Surgery at WLH
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Structure & Organelles in detailed.
FourierSeries-QuestionsWithAnswers(Part-A).pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Microbial disease of the cardiovascular and lymphatic systems
2.FourierTransform-ShortQuestionswithAnswers.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Anesthesia in Laparoscopic Surgery in India
Weekly quiz Compilation Jan -July 25.pdf
O7-L3 Supply Chain Operations - ICLT Program
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...

Intrusion Detection Systems Objectives In this lab, st.docx

  • 1. Intrusion Detection Systems Objectives In this lab, students will examine the following objectives. Differentiate the use of IDS and IPS to detect network attacks Design a network with IDS/IPS. Justify the use of IDS/IPS for a given network solution. Scenario A small company is using the topology shown below to secure its intranet while provides a less-secured environment to its eCommerce DMZ server. The company is concerned firewalls are not enough to detect and prevent network attacks. Hence, deployment of sensors to Intrusion detection systems (IDS) and/or intrusion prevention systems (IPS) are needed in the network. Your job is to provide recommendations including a network design with IDS/IPS that meet company’s requirements. Initial Topology Company’s Requirements Detect any malicious traffic entering the ecommerce server
  • 2. without performance penalty to traffic getting in the server from revenue-generating customers. Stop any malicious traffic entering the human resources LAN (HR LAN). Detect any malicious traffic entering the computer terminal in the marketing LAN (MKT LAN). Stop any traffic entering the File Server in MKT LAN. Deploy a centralized database and analysis console in the intranet to managing and monitoring both; IDS and IPS sensors. Note: RED text indicates the required questions to answer Task 1—Layout the New Network Design Click on the Initial Network Topology link at iLab tab in week 7, and save in your computer the power point file Initial_Network_Topology_iLab7.ppt . This file contains a diagram for the initial network topology and pictures of all components needed to create the new network design. Review the documentation provided in the references at the end
  • 3. of this instructions, to get more familiar with the implementation of IDS and IPS in network design. You need to find a network solution that meets company’s requirements. #1. Paste below your new network design diagram. Task 2—IDS/IPS Recommendations #2. Write an engineering specification document of at least 250 words (e.g. 1 page of full text, double space & size 12) describing why your networks design meets each of the company’s requirements. Justify how each recommendation addresses the company’s needs. Task 3— Conclusions #3. Describe in two paragraphs your learning experience in this lab.