Deploying host-based idss, Computer Network Security

Deploying Host-Based IDSs

-Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems first Installation continues until either all systems are installed, or the organization reaches planned degree of coverage it is willing to live

MEASURING THE EFFECTIVENESS OF IDS

IDSs are evaluated by using two dominant metrics:
-Administrators evaluate number of attacks detected in the known collection of probes
-Administrators examine level of use at which IDSs fail

Evaluation of IDS might read: at 100 Mb/s, IDS was able to detect 97 percent of directed attacks as developing this collection can be tedious, most IDS vendors provide testing mechanisms which verify systems are performing as expected. These testing processes allows administrator to:
- Record and retransmit packets from virus or worm scan
-Record and retransmit packets from a virus or worm scan with incomplete
-TCP/IP session connections
-Conduct a real virus or worm scan against an invulnerable system

Posted Date: 10/9/2012 4:01:30 AM | Location : United States







Related Discussions:- Deploying host-based idss, Assignment Help, Ask Question on Deploying host-based idss, Get Answer, Expert's Help, Deploying host-based idss Discussions

Write discussion on Deploying host-based idss
Your posts are moderated
Related Questions
implementing password policy in organisation

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

Normal 0 false false false EN-US X-NONE X-NONE

Question: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume the following: the signal level for the previous bit for NRZI was a 1

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

What do you understand by the term encryption? Also describe the public key cryptography Encryption: Encryption is a method of converting plain text into cipher text. Using thi

Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the intern