subject
Computers and Technology, 21.12.2019 02:31 lcar61

Aparticular vendor uses the following approach to intrusion detection.16 the company maintains a large number of honeypots distributed across the internet. to a potential attacker, these honeypots look like vulnerable systems. consequently, the honeypots attract many attacks and, in particular, new attacks tend to show up on the honeypots soon after— sometimes even during—their development. whenever a new attack is detected at one of the honeypots, the vendor immediately develops a signature and distributes the resulting signature to all systems using its product. the actual derivation of the signature is generally a manual process.

a. what are the advantages, if any, of this approach as compared to a standard signature-based system?
b. what are the advantages, if any, of this approach as compared to a standard anomaly-based system?
c. using the terminology given in this chapter, the system outlined in this problem would be classified as a signature-based ids, not an anomaly-based ids. why?
d. the definition of signature-based and anomaly-based ids are not standardized.17 the vendor of the system outlined in this problem refers to it as an anomaly-based ids. why might they insist on calling it an anomaly-based ids, when your well-nigh infallible author would classify it as a signature-based system?

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
Which law requires employers to provide safe working environments for their employees? a. civil rights act b. fair labor standards act c. occupational safety and health act d. wagner act
Answers: 1
question
Computers and Technology, 22.06.2019 16:30
Which of the following statements best describes it careers?
Answers: 2
question
Computers and Technology, 22.06.2019 22:20
Pp 4.1 design and implement a class called sphere that contains instance data that represents the sphere’s diameter. define the sphere constructor to accept and initialize the diameter and include getter and setter methods for the diameter. include methods that calculate and return the volume and surface area of the sphere (see pp 3.5 for the formulas). include a tostring method that returns a one-line description of the sphere. create a driver class called multisphere, whose main method instantiates and updates several sphere objects.
Answers: 1
question
Computers and Technology, 23.06.2019 06:00
Which statement is true of web-based social media? a.they allow consumers to interact with and update content. b.they cannot be updated easily, as compared to print media. c.they are expensive to produce and maintain, as compared to print and television. d.they can exist independent of the internet.
Answers: 1
You know the right answer?
Aparticular vendor uses the following approach to intrusion detection.16 the company maintains a lar...
Questions
question
Chemistry, 17.07.2019 06:40