Our social:

Latest Post

Saturday, 22 June 2013

CLOUD COMPUTING: BASIC CONCEPTS


-->

Cloud Computing – The technology of distributed data processing in which some scalable information resources and capacities are provided as a service to multiple external customers through Internet technology.

Cloud computing concept includes all of the following concepts:

IaaS (Infrastructure as a Service) – A computer infrastructure, typically presented in the form of virtualization. Is a service within the concept of cloud computing.

PaaS (Platform as a Service) – An integrated platform for the development, deployment, testing and support of web-applications. Presented as a service on the basis of the concept of “cloud hosting“. 

SaaS (Software as a service) – Is the business model of software license, which involves the development and support of the software vendor. Customers also have the opportunity of paid use of it, usually through the Internet.

DaaS (Desktop as a Service) – Another business model license the software, which is a slightly improved model of SaaS, mostly involving the use of multiple services at the same time necessary to complete the work. Was first introduced in the early 2000s.

In addition to the above within the concept of cloud computing there are also common notion Data as a service and Everything as a service respectively. Both concepts show that, through the World Wide Web using Cloud Computing, can meet any requirements in the processing of information. This is the main advantage of cloud computing in the IT-based business solutions.


Sunday, 16 June 2013

What is Intrusion Detection System? How it works ?

This is a post which i stared learning recently so sharing my little knowledge so intrusion detection system (IDS) is basically used for monitoring the network, it detects intruders; that is, unexpected, unwanted or unauthorized people or programs on network.



An intrusion detection system has a number of sensors that is used to detect unwanted or unexpected flow of network traffic, the major sensors as follows:



  • A sensor monitor log files

  • A sensor monitor TCP ingoing or outgoing connections


    How Intrusion Detection System Works?

    Intrusion detection system works by collecting information and then examining it.IDS collects data from it sensors and analyze this data to give notice to the system administrator about malicious activity on the network.

  • An intrusion detection system can be run manually but most IT administrators find it easier to automate the system checks to ensure that nothing is accidentally overlooked.

  • We can mainly categorize an IDS into two type:

    1. NIDS (Network Intrusion Detection Systems).
    2. HIDS (Host Intrusion Detection Systems)

    There is still a question, why we use IDS if there is firewall to perform these tasks, Firewall is used to stop unwanted traffic from entering or leaving the internal enterprise network, where as the IDS is deployed to monitor traffic in vital segments in the network, generating alerts when an intrusion is detected.

    A firewall has got holes to let things through, without it you wouldn't be able to access the Internet or send or receive emails, there are different ways to bypass or cheat a firewall.

    Snort is an excellent open source Network Intrusion Detection System, OSSEC is an Open Source Host-based Intrusion Detection System.

    Below is an an overview of the basic architecture as well as practical examples of how to customize Open Source Host-based Intrusion Detection System to manage logging from your infrastructure and applications.

  • Video On Intrusion Detection System

    source:DARKSITE