Provides intrusion detection, managed online for computer and network security, is a type of security management.
Similarly, safeguards against intrusion detection system security management, and other types, such as computer and network. Collect ID information intrusion of computer or both-research organizations from different disciplines in the network to find security breaches that may contain from attack and misuse. Is called the technology to monitor it as an integrated computer system or network security and vulnerability assessment scans.
Intrusion detection system works.
1. Make sure both system and user behavior analysis
2. Inspect the system configuration or vulnerability.
3. Evaluate the integrity of systems and files.
4. Detect and prevent network intrusions
5. Adopt the management role of anti-virus and anti-spyware.
6. Recognize the typical pattern of attack.
7. Check the abnormal activity patterns.
8. Follow the user policy violations.
Main site and the White House, NATO is responding are expanding ID system is increased for a number of attacks on networks, such as the Department of Defense, U.S. Department of Defense. Technology of sophisticated scammers towards computer and Internet security is more and more difficult. In addition, via the web is available request for scientific and technical capacity of the tested method is less easily.
There are ways to group ID listed below:
Misuse detection and anomaly detection
Detect abuse, reviews and compares the system information and an enormous database to collect and attack signatures. This software is a cross-referenced packet across the comparison, and attack signature database. Anomaly detection, system administrator creates a baseline or normal network traffic load, breakdown, Protocol, and a typical packet size status. Anomaly detector to investigate a network segment, also compares the appearance of standard baseline abnormal conditions.
Network and host-based systems
Network-based systems, each packet examined the network through. This system is overlooked by a firewall monitors malicious fabrication. Host-based system, review of the activities of each individual computer or host.
Passive and reactive systems
Passive intrusion detection system, a potential breach of security log information it should be, by the place the network security alert as collateral. Reprogramming reactive system stops the network traffic for suspicious activity and avoid potential attacks for the firewall to log off the user will be prompted.
No comments:
Post a Comment