Application-based ids, Computer Network Security

Application-Based IDS

Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the unique advantage ofAppIDS. It may be configured to the following types of intercept requests and use them in combination and sequences.

-File System
-Network Configuration
-Execution Space

Advantages and Disadvantages of AppIDSs

Advantages


-Aware of specific users and can observe interaction between application and user
-Able to operate when the incoming data is encrypted

Disadvantages

-It is more susceptible to attack
-It is less capable of detecting software tampering
- Can be taken in by forms of spoofing

Posted Date: 10/9/2012 3:46:37 AM | Location : United States







Related Discussions:- Application-based ids, Assignment Help, Ask Question on Application-based ids, Get Answer, Expert's Help, Application-based ids Discussions

Write discussion on Application-based ids
Your posts are moderated
Related Questions
#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Ask question #Minimum 100 words are there non parasitic viruses

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

Public Key Infrastructure (PKI) It is integrated system of software, encryption methodologies, protocols, legal agreements, and 3rd-party services enabling users to communicate

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Ask question #Minimum 100 words acceptwwwed#

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats