Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

INTRUSION DETECTION SYSTEM by Mind Map: INTRUSION DETECTION
SYSTEM
0.0 stars - reviews range from 0 to 5

INTRUSION DETECTION SYSTEM

IDS

Detect computer attacks and/or misuse

Three types

Signature base, Similar to virus scanning, only as good as the signature database, Good for scripted exploits

Anomaly base, exceeding a limit on login attempts, Finding a NIC card in promiscuous mode, User sending abnormally large numbers of email

Decoy base, Honeypots

ALOT of output

Tendency not to keep up

Outsource, expensive

Dorothy Denning

Snort

Network based

lightweight IDS performs real time traffic analysis and packet logging on IP networks