IDS

SEMINAR ON IDS : The correct firewall policy can reduce exposure to many networks, but they are pretty useless against attacks launched from within. Hackers are also evolving their methods of attacks and network subversion. These techniques include e-mail message to Troy, the techniques of stealth scanning, malicious code and attacks on real, ignore the firewall policy of tunnels used by more than allowed protocols such as ICMP, HTTP, DNS, hackers etc. are also very good at creating and releasing the malware ever-growing list of application vulnerabilities affect some services are hired by a firewall.
IDS arm of your organization against attacks by monitoring network activity, ensuring that all activities are normal. If the IDS detects malicious activity, it immediately reacts by destroying the attacker to access and stop the attack. IDS reader network traffic and looks for patterns of attack signatures and whether the signature is identified, the IDS sends an alert to the management console and a reaction is used directly.
is someone who tries to penetrate or abuse the system. The 'abuse' is broad, and may reflect something drastic to steal confidential information is somehow secondary, as the abuse of the system to address e-mail spam.
is a real-time monitoring of network activity and system and analysis of potential vulnerabilities and attacks in progress.




No comments:

Post a Comment