Anomaly-Based DetectionAnomaly-based detection method for an event that deviates from the. Regular events in the detector, which works as a statistical comparison, so this type of IDS deployment require IDS. Learn how normal traffic before, during a period of time (training period) to create a database called the profile, and then start to use the system events profile settings will be stored in normal conditions, such as user, host, connectivity, bandwidth, etc. For example, the profile of the network, saying that usually has a traffic web category at the Internet gateway accounted for 20% of bandwidth during normal working hours upon IDS. Find traffic web category at the Internet gateway Exceeding the threshold values that are expected to send notifications to the administrator immediately.You can also modify the profile that you want to capture as many email that gets sent in 1 loop 1 ต่อั users or the number of login into the server, both the successful and unsuccessful per day or working level of the server computer's CPU, etc, and because this type of IDS do not need updated signature IDS like signature-based makes it possible to detect an intrusion attack is zero-day for example, there is a new type of malware threats causing the CPU usage significantly. Send bulk email Create a network connection a lot in a short time, which makes. The event occurred that clearly deviates from the normal event.The issue of how this method of detection is the accuracy of the profile, because the pattern of data flow is more complicated in some organizations that have multiple application, multiple protocol tends to make it difficult to tune profile caused the problem of large numbers of false positive. For example, to perform maintenance tasks The system usually has a backup (backup) which will be send large files once a month, which is possible as normal behaviour are learning IDS to profile not visible. This makes the event IDS. This data backup notification that it is an unusual event.Stateful Protocol AnalysisThe Stateful Protocol Analysis detection is the detection of a specific protocol for normal things on them by comparison with protocol profile that is intended.Stateful Protocol Analysis detection from the Anomaly-based profile is created from each vendor that uses protocol. The data flow is not caused by normal behaviour characteristics, learning of the network or computer on a network.
การแปล กรุณารอสักครู่..
