11.1 - Intrusion Detection Systems
11.1 - Intrusion detection systems
Key Terms:
- Network intrusion detection system (NID) - A security measure installed on a network that monitors network traffic to detect exploits.
- Host intrusion system – A security measure installed on a host that monitors activity to detect exploits.
- Signature-based detection – A security system that compares network traffic to known signatures in a database.
- Anomaly-based detection – A security system that compares network or host behaviour to a base line profile.
- Protocol-based detection – A security system that detects anomalies in a specific protocol.
- True positive – A real threat has been discovered and confirmed.
- False positive – A false threat has been confirmed.
- True negative – No threats were discovered.
- False negative – There are threats present, but they have not been discovered.
- DoS and DDoS – Attacks where a host is taken down or disrupted due to a flood of packets overloading it.
- Insertion – When malicious code is edited to bypass processing by the IDS.
- Obfuscation – Hiding malicious code so that the IDS can’t find it.
- Nmap – An open-source network mapping and scanning tool.
- TCP – A protocol used to send packets over the internet through connections.
- UDP – A transport layer protocol that sends packets over the internet without connection.
- ICMP – A control protocol which gets sent error and control messages.
Comments
Post a Comment