Ids response behavior, Computer Network Security

IDS RESPONSE BEHAVIOR

Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

-Active response is a definitive action initiated when certain types of alerts triggered for example collecting additional information about the intrusion, taking action against intrusion.
-Passive response options simply report for example setting off alarms, collecting passive data.


A list of response options for IDS is as follows

-Audible/visual alarm
-E-mail message
-Page or phone message
-Evidentiary packet dump
-Terminate session
-Take action against the intruder
-Launch program
-SNMP traps and plug-ins
-Reconfigure firewall
-Terminate connection

Posted Date: 10/9/2012 3:50:21 AM | Location : United States







Related Discussions:- Ids response behavior, Assignment Help, Ask Question on Ids response behavior, Get Answer, Expert's Help, Ids response behavior Discussions

Write discussion on Ids response behavior
Your posts are moderated
Related Questions
Elements of Cryptosystems Cryptosystems is characteristically made up of algorithms, data handling techniques, and procedures which are combined in multiple ways to ensure confi

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

INTRODUCTION TO CRYPTOGRAPHY Cryptography The word cryptography is derived from Greek words kryptos, which means hidden and graphein, meaning to write, this is the process of

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

Question 1 The speech act theory is used as the model for communication among computational agents. Locution, illocution, and perlocution are the 3 aspects of this theory Using

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

implementing password policy in organisation

Problem a) Give the destination IP address, upper layer protocol, TTL in decimal and header checksum in hexadecimal; the source port number and the destination port number in deci

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Network diagram for a mediacal care