- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Chapter 9The Art of Intrusion Detection.ppt
NBD Pros and Cons Advantages: Low cost No interference Intrusion resistant Disadvantages: May not be able to analyze encrypted packets Hard to handle large volume of traffics in time Some intrusion activities are hard to identify Hard to determine whether the intrusion has been successfully carried out HBD Pros and Cons Advantages: Can detect data encrypted during transmissions Detect intrusions that cannot be detected by NBD Do not need special hardware devices Check system logs, more accurate Disadvantages: Require extra system managing Consume extra computing resources May be affected if host computers or servers affected Cannot be installed in routers or switches Signature Classification Signature Detection System Build-in System Store detection rules inside the system Provide an IDS editor to user User can select rules based on their needs Programming System Has default rules and a programming language Allow users to select rules and define their own rules Expert System More specific and comprehensive Require domain experts Events Measures Event Counter An integer variable for each type of events to record the total number of times this type of events occurs in a fixed period of time Event Gauge An integer variable for each measurable object in the system to denote the current value of the object Event Timer An integer variable for two related events in the system to denote the time difference of the occurrences of the first event and the second event Resource Utilization A variable for each resource in the system to record the utilization of the resource during a fixed period of time Behavioral Data Forensics Behavioral data forensics studies how to use data mining techniques to analyze event logs and search for useful information Data Mining Techniques Data Refinement Contextual Interpretation Source Combination Out-of-Band Data Drill Down A behavioral data forensic example (pp.339) Honeypots Definition: Any device, system, directory, or file used as a decoy
您可能关注的文档
- a course of lectures.ppt
- A Dialogue in the Hospital.ppt
- a doctor.ppt
- A Proposal for NAEFS 8-14-day Forecasts.ppt
- A+标准制定的背景.ppt
- A.B.L.M.C.C HISTORY PORJECT.ppt
- a.归纳本文的情节发展步骤。.ppt
- A={4,5,6,8}B={3,5,7,8}C={5,8}.ppt
- AAA EVAR手术病例.ppt
- AAS and FES(Ch 9, 7th e, WMDS).PPT
- Chapter 9The Normal Distribution.ppt
- Chapter 9TRAP Routines andSubroutines.ppt
- Chapter Extension 7.ppt
- Chapter Four.ppt
- Chapter FourteenThe sixties and seventies.ppt
- Chapter Nine Checking Out.ppt
- Chapter Seven.Overview of Chapter 7.PPT
- Chapter10Operational Amplifier Applications.ppt
- Chapter15 精确模型.ppt
- Chapters 8Network Security.ppt
文档评论(0)