Tuesday, July 23, 2019

Anomaly Detection Scheme for Prevention of Online Attacks Dissertation

Anomaly Detection Scheme for Prevention of Online Attacks - Dissertation Example The time parameter reflects any deviation from the normal (duration taken) in disseminating information and receiving of the feedback. The efficiency of communication is therefore slowed down and this cripples the activities of an institution. Hacking of the internet system distorts the original information that was fed and may bring about a jam. All these are prevented by use of highly advanced and sophisticated modern devices that quickly sense and produce signals to notify the comptroller (Chiang, 2004). Data analysis must be undertaken to confirm and ensure only the vital information is online and accessed by the target population. The systems are made in a way that they are able to identify the geographical location of an attacker who can then be easily trailed, and legal action may be taken. The coming attacks may also be blocked by an automated program in the system. Updating should always be done to facilitate prompt detection of attacks. This ensures the system remains at pa ce with any new technological changes. When all security measures are considered, the privacy of an institution remains secured. They remain at the disposal of the authorized authorities. Transmission of information must be sufficient at the shortest time possible. According to Chiang (2004), visualization of system level is done to integrate technology with the systems hardware, software or both. This ensures protection by offering an opportunity to study and analyze visual patterns that indicate any possible attack. Sensors are used to detect and send an alert signal inform of graphs on a screen. Multiple attacks are easily displayed and tracked down from their sources. This calls for a quick action in order to protect the data which includes resetting of the connection. All the forecasting and analysis is done in a data warehouse. This method ensures a quick and smooth action is taken to counteract any attack at the shortest time possible. Selection of heterogeneous threshold and conduct of a proper correlation analysis ensures systems are well set to accommodate large amounts of data and detect any slight attacks at any moment. A web of links is made that connects the major system to several others. A threshold value is also set which sounds an alarm when exceeded. The ease of detection of attacks becomes easier since either of them signals the main server (Chiang, 2004). An internal program is installed to ensure the system is able to detect any foreign data and differentiate self from non-self before sending a signal. The system becomes protected from collapsing and is encompassed with appropriate buffer zones to ensure the best possible results are obtained. Anomaly refers to deviation from the normal way in which information systems operate. This compromises the confidentiality and security of information contained within the system. Any delay in detection and streamlining back to normal may result to great negative impacts. Computers should therefore be protected from any form of attack by installation of a specialized and highly sensitive detector. This is called a detection scheme. It is backed up by additional security features which limit access to specific individuals and from a central point. The system is well cushioned and security guaranteed. Most institutions trust the viability of this security measure.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.