Ids response behavior, Computer Network Security


Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

-Active response is a definitive action initiated when certain types of alerts triggered for example collecting additional information about the intrusion, taking action against intrusion.
-Passive response options simply report for example setting off alarms, collecting passive data.

A list of response options for IDS is as follows

-Audible/visual alarm
-E-mail message
-Page or phone message
-Evidentiary packet dump
-Terminate session
-Take action against the intruder
-Launch program
-SNMP traps and plug-ins
-Reconfigure firewall
-Terminate connection

Posted Date: 10/9/2012 3:50:21 AM | Location : United States

Related Discussions:- Ids response behavior, Assignment Help, Ask Question on Ids response behavior, Get Answer, Expert's Help, Ids response behavior Discussions

Write discussion on Ids response behavior
Your posts are moderated
Related Questions
(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Question: (a) What do you understand by the term "integrity"? (b) Which type of attack denies authorized users access to network resources? (c) You have discovered tha

Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct