11.1 - Intrusion Detection Systems

 11.1 - Intrusion detection systems 

 

Key Terms: 

    • Network intrusion detection system (NID) - A security measure installed on a network that monitors network traffic to detect exploits. 
    • Host intrusion system – A security measure installed on a host that monitors activity to detect exploits. 
    • Signature-based detection – A security system that compares network traffic to known signatures in a database. 
    • Anomaly-based detection – A security system that compares network or host behaviour to a base line profile. 
    • Protocol-based detection – A security system that detects anomalies in a specific protocol. 
    • True positive – A real threat has been discovered and confirmed. 
    • False positive – A false threat has been confirmed. 
    • True negative – No threats were discovered. 
    • False negative – There are threats present, but they have not been discovered. 
    • DoS and DDoS – Attacks where a host is taken down or disrupted due to a flood of packets overloading it. 
    • Insertion – When malicious code is edited to bypass processing by the IDS. 
    • Obfuscation – Hiding malicious code so that the IDS can’t find it. 
    • Nmap – An open-source network mapping and scanning tool. 
    • TCP – A protocol used to send packets over the internet through connections. 
    • UDP – A transport layer protocol that sends packets over the internet without connection. 
    • ICMP – A control protocol which gets sent error and control messages. 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1