Rule Definition For Anomoly Based Intrusion Detection

    Date27 Jan 2003
    4253
    Posted ByAnthony Pell
    Intrusion Detection Systems are one of the fastest growing technologies in the security space. Unfortunately, many companies find it hard to put it to use due to the complexity of deployment and or lack of information about it possible use. . . .
    Intrusion Detection Systems are one of the fastest growing technologies in the security space. Unfortunately, many companies find it hard to put it to use due to the complexity of deployment and or lack of information about it possible use. This document should help security experts, integrators, or end-customers to utilize their IDS system to its limits or to fit the expectation required by the company.

    The market is currently filled by rule-based IDS solutions aiming at detecting already known attacks by analyzing traffic flow and looking for known signitures. This fact requres such IDS to be under constant construction updating and modifying attack signitures and requiring to pay a considerable financial amount for support.

    On the other hand, it is possible to use anomoly based IDS solutions detecting not just known attacks, but also unknown attackas and informing network engineers about possible network problems or helping them to troubleshoot them.

    The link for this article located at Lubomir Nistor is no longer available. 

     

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"90","type":"x","order":"1","pct":78.95,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15.79,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5.26,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.