Application-based ids, Computer Network Security

Application-Based IDS

Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the unique advantage ofAppIDS. It may be configured to the following types of intercept requests and use them in combination and sequences.

-File System
-Network Configuration
-Execution Space

Advantages and Disadvantages of AppIDSs

Advantages


-Aware of specific users and can observe interaction between application and user
-Able to operate when the incoming data is encrypted

Disadvantages

-It is more susceptible to attack
-It is less capable of detecting software tampering
- Can be taken in by forms of spoofing

Posted Date: 10/9/2012 3:46:37 AM | Location : United States







Related Discussions:- Application-based ids, Assignment Help, Ask Question on Application-based ids, Get Answer, Expert's Help, Application-based ids Discussions

Write discussion on Application-based ids
Your posts are moderated
Related Questions
Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Screened Subnet Architecture This setup provides an extra security layer to screened host architecture by creating a perimeter subnet which further isolates internal network f

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Question (a) Inspect the following ifconfig output of an IPv6 interface: i. What is the hidden Hardware Address of the interface on Line #1? ii. What is the hidden subn

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the


Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

SECURITY ANALYSIS Overview •    Know yourself: examine, identify, and understand the information and systems which are currently in place •    Know the enemy: examine, identify,

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a