Ids response behavior, Computer Network Security

IDS RESPONSE BEHAVIOR

Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

-Active response is a definitive action initiated when certain types of alerts triggered for example collecting additional information about the intrusion, taking action against intrusion.
-Passive response options simply report for example setting off alarms, collecting passive data.


A list of response options for IDS is as follows

-Audible/visual alarm
-E-mail message
-Page or phone message
-Evidentiary packet dump
-Terminate session
-Take action against the intruder
-Launch program
-SNMP traps and plug-ins
-Reconfigure firewall
-Terminate connection

Posted Date: 10/9/2012 3:50:21 AM | Location : United States







Related Discussions:- Ids response behavior, Assignment Help, Ask Question on Ids response behavior, Get Answer, Expert's Help, Ids response behavior Discussions

Write discussion on Ids response behavior
Your posts are moderated
Related Questions
Q. Secure routing Protocols for Wireless Sensor Networks? A secure routing information protocol enables effective implementation of authentication and integrity checking defens

which is best algorithm

how much would you charge for minimum 20 pages

Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Network diagram for a mediacal care

Websphere Administrator: Working as Websphere Administrator in the department called DART (Database Architecture Re-Engineering and Tuning). The major responsibilities are t

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)