i would like to get advantages and disadvantages of intrusion detection system in cloud computing
Posts: 14,118
Threads: 61
Joined: Oct 2014
Intrusion detection systems for computers provide a complete defense against identity theft, information mining and network piracy. Large corporations and government agencies use this software to keep information and accounts secure, as well as to monitor employee network activities to ensure facilities on site are not misused. But for all the advantages, intrusion detection systems are hampered by the inability to say malicious activity from accidental or lawful activity and can block a network that causes loss of work and income. As companies continue to increase their use of the Internet for business uses, the occurrences of IT intrusions will increase. These intrusions are known as security breaches and result in the loss of proprietary information, if the breach is able to access the sensitive information of the company. Installing intrusion detection software is the first line of defense for most businesses. Although intrusion detection software can help with network security, there are some disadvantages to the software.
Constant network monitoring
Intrusion detection systems constantly monitor a given computer network for invasion or abnormal activity. The advantage of this service is the "round" aspect of the clock, where the system is protected even while the user is asleep or otherwise away from any computer connected to the network. User information, network access and firewall measures are actively updated and controlled by intrusion detection systems.
System Versatility
Intrusion detection systems are highly customizable to suit the specific needs of the customer. This allows users to customize network security to monitor highly individualized activity; From overt attacks to network up to the examination of suspicious or activity-specific patterns that may be an attempt to masquerade to penetrate the security of the system from outside the network, or perhaps the work of someone inside the safety net. The system can, through personalization, monitor both the external threats to a given network and the behavioral patterns that can be threats that operate within the system.
Saying threat to a friend
The main disadvantage of intrusion detection systems is their inability to tell an enemy friend. Users within the system can have a harmless activity signaled by the intrusion detection system, resulting in a network lock for an indeterminate period of time until a professional can be on site to identify the problem and restart The detection system. For a company dependent on fast action for time-oriented material, this can cause a drastic loss of revenue and customer trust, since partners can take business elsewhere to a company with a more reliable network.