Anúncio
Anúncio

Mais conteúdo relacionado

Anúncio
Anúncio

Intrusion detection system

  1. Misfeasor: A legitimate user who accesses data, programs or resources for which such access is not authorized, or who is authorized for such access but misuses his or her privileges.
  2. IDS is a system designed to test/analyze network system traffic/events against a given set of parameters and alert/capture data when these thresholds are met.
  3. IDS uses collected information and predefined knowledge-based system to reason about the possibility of an intrusion.
  4. An IDS does not usually take preventive measures when an attack is detected.
  5. It is a reactive rather than a pro-active agent.
  6. The IDS must stay active and secure
  7. The IDS must be able to recognize unusual activity
  8. The IDS must operate without unduly affecting the system’s activity
  9. Console: Responsible for analyzing packets captured by Sensor class.
  10. Known attacks or
  11. Suspicious behavior
  12. Designed to detect attacks such as
  13. Buffer overflow
  14. Escalation of privilege
  15. FTP and DNS servers;
  16. E-commerce database servers, etc.
  17. Known attacks
  18. Suspicious network activity
  19. Designed to detect attacks such as
  20. Denial of service
  21. Network probes
  22. Malformed packets, etc.
  23. Can be some overlap with firewall
  24. Outside firewall
  25. Just inside firewall
  26. Combination of both will detect attacks getting through firewall and may help to refine firewall rule set.
  27. Behind remote access server
  28. Between Business Units
Anúncio