Deploying host-based idss, Computer Network Security

Deploying Host-Based IDSs

-Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems first Installation continues until either all systems are installed, or the organization reaches planned degree of coverage it is willing to live


IDSs are evaluated by using two dominant metrics:
-Administrators evaluate number of attacks detected in the known collection of probes
-Administrators examine level of use at which IDSs fail

Evaluation of IDS might read: at 100 Mb/s, IDS was able to detect 97 percent of directed attacks as developing this collection can be tedious, most IDS vendors provide testing mechanisms which verify systems are performing as expected. These testing processes allows administrator to:
- Record and retransmit packets from virus or worm scan
-Record and retransmit packets from a virus or worm scan with incomplete
-TCP/IP session connections
-Conduct a real virus or worm scan against an invulnerable system

Posted Date: 10/9/2012 4:01:30 AM | Location : United States

Related Discussions:- Deploying host-based idss, Assignment Help, Ask Question on Deploying host-based idss, Get Answer, Expert's Help, Deploying host-based idss Discussions

Write discussion on Deploying host-based idss
Your posts are moderated
Related Questions
There are various benefits related with providing the security. They are given below,  (i)  Confidentiality/ Privacy (ii)  Integrity  (iii) Availability (iv)Authenticatio

MB Enterprise Systems Ltd based in Mauritius is a company specialized in application development with Europe as the main customer base. The company has implemented CMMI and has rec

a) Explain the contents of the Cost Assessment. b) Various Documents are needed for Configuration Management. State three of them, and describe their importance. c) Given tha

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

You see two IP addresses. The IP address is the one of Bt4. The IP address has ports 135 and 445 open; which indicates that it is a Windows machine. S

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be