Application-based ids, Computer Network Security

Application-Based IDS

Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the unique advantage ofAppIDS. It may be configured to the following types of intercept requests and use them in combination and sequences.

-File System
-Network Configuration
-Execution Space

Advantages and Disadvantages of AppIDSs

Advantages


-Aware of specific users and can observe interaction between application and user
-Able to operate when the incoming data is encrypted

Disadvantages

-It is more susceptible to attack
-It is less capable of detecting software tampering
- Can be taken in by forms of spoofing

Posted Date: 10/9/2012 3:46:37 AM | Location : United States







Related Discussions:- Application-based ids, Assignment Help, Ask Question on Application-based ids, Get Answer, Expert's Help, Application-based ids Discussions

Write discussion on Application-based ids
Your posts are moderated
Related Questions
CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

why is it that sometime we put password in our account to login or signup and it would not work?

"Using the CNSS Model, examine each of the cells and write a brief statement on how you would address the components respesented in that cell"

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a


Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S