Ids response behavior, Computer Network Security


Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

-Active response is a definitive action initiated when certain types of alerts triggered for example collecting additional information about the intrusion, taking action against intrusion.
-Passive response options simply report for example setting off alarms, collecting passive data.

A list of response options for IDS is as follows

-Audible/visual alarm
-E-mail message
-Page or phone message
-Evidentiary packet dump
-Terminate session
-Take action against the intruder
-Launch program
-SNMP traps and plug-ins
-Reconfigure firewall
-Terminate connection

Posted Date: 10/9/2012 3:50:21 AM | Location : United States

Related Discussions:- Ids response behavior, Assignment Help, Ask Question on Ids response behavior, Get Answer, Expert's Help, Ids response behavior Discussions

Write discussion on Ids response behavior
Your posts are moderated
Related Questions
Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

Question 1: (a) Explain the operation of the "matchmaker" middle agent. (b) Describe why broker middle agents are more efficient in terms of the time taken for a service to

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they

Question: Spreadsheet packages are widely used in Business. a) Explain why spreadsheets are so useful. b) Spreadsheet files are sometimes saved for use by other software

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war