merkow ppt 12-JRM

merkow ppt 12-JRM merkow ppt 12-JRM

sites.csn.edu
from sites.csn.edu More from this publisher
26.10.2012 Views

Intrusion Detection Systems (IDS) -Two Classes cont. � Anomaly intrusions � Observations of deviations from normal system usage patterns � Can be detected by building up a profile of the system in question and detecting significant deviations from the profile � Can use neural networks, machine learning classification techniques � Harder to detect © Pearson Education Information Security: Principles and Practices 32

Intrusion Detection Systems (IDS) cont. � A Good Intrusion Detection System must � run continually without human supervision � be fault tolerant � resist subversion � impose minimal overhead on the attached network � observe deviations from normal behavior � be easily tailored to the network � cope with changing system behavior © Pearson Education Information Security: Principles and Practices 33

Intrusion Detection Systems (IDS)<br />

cont.<br />

� A Good Intrusion Detection System must<br />

� run continually without human supervision<br />

� be fault tolerant<br />

� resist subversion<br />

� impose minimal overhead on the attached<br />

network<br />

� observe deviations from normal behavior<br />

� be easily tailored to the network<br />

� cope with changing system behavior<br />

© Pearson Education Information Security:<br />

Principles and Practices 33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!