問題一覧
1
collect statistical summaries of normal traffic to form baseline
statistical anomaly based
2
IDS detects attacks and transfers to simulated environment
padded cell
3
classification of IDPS alerts
alarm filtering
4
attacker change the format and/or timing of activities to avoid being detected
evasion
5
report to a hierarchical central facility, one of the more effective methods
partially distributed
6
alarms events that are accurate but don't pose threats
noise
7
types of IDPS
network based, host-based
8
can monitor multiple computer simultaneously
host-based
9
act as quality control for security design and administration
IDPS
10
event that triggers alarms in event of real attack
true attack stimulus
11
focused on protection network information assets
network based
12
alarm activates in the absence of an actual attack
false positive
13
based on frequency on which network activities take place
statistical anomaly based
14
indication that attack is happening
alarm or alert
15
what is active on computer
port scanners
16
procedures and systems that identify system intrusions
intrusion detection
17
help find vulnerabilities in system
scanning and analysis tools
18
wireless, monitors packets, looks for attack patterns
network based
19
two dominate methodologies
signature-based, statistical-anomaly approach
20
tracks interaction between users and applications
application based
21
consist of honey pot or padded cell and alarm
trap and trace systems
22
measure of IDPS ability to correctly detect and identify type of attacks
confidence value
23
opposite of centralized
fully distributed
24
ability to dynamically modify configuration in response to environmental activity
site policy awareness
25
collection of honey pots
honey net
26
adjusting an IDPS
tuning
27
activities that deter an intrusion
intrusion prevention
28
all IDS control functions are implemented and managed in a centralized location
centralized
29
looks for patterns signatures in log files
log file monitors
30
encourages attacks against themselves
honey pots
31
event triggers alarm - no real attack
false attack stimulus
32
monitors and analyzes wireless network
wireless NIDPS
33
examines data traffic in search of patterns that match known signature
signature-based
34
classifies files in categories and applies various notification actions based on rules
host-based
35
lure potential attackers away from critical systems
honey pots
36
scanning and analysis tools
port scanners, firewall analysis tools, operating system detection tools, vulnerability scanners, packet sniffers
37
generally accepted combination
intrusion detection and prevention system
38
validation of users identity
authentication
39
control strategies
centralized, partially distributed, fully distributed
40
besides on computer or appliance connected to a segment of organization network
network based
41
All control functions apply that the physical location of each ID is component
fully distributed
42
focused on protection server of host's information assets
host-based
43
similar to NIDS, reviews logs
log file monitors
44
grouping almost identical alarms happening at close to the same time
alarm clustering and compaction
45
able to look at multiple log files from different systems
log file monitors
46
intrusion detection and prevention system terminologies
alarm or alert, evasion, false attack stimulus, false negative, false positive, noise, site policy, site policy awareness, true attack stimulus, tuning, confidence value, alarm filtering, alarm clustering and compaction
47
packet structure
protocol verification
48
contains pseudo services the emulated well-known services
honey net
49
allow system admin to see what the attacker sees
scanning and analysis tools
50
resides on a particular computer or server and monitors traffic only on that system
host-based
51
works like a burglar alarm
intrusion detection system
52
Packet use
application verification
53
commercially available in late 1990
intrusion detection system
54
protected honey pot
padded cell
55
decoy systems
honey pots
56
activities finalized the restoration of operations to a normal state and activities seek to identify the source and method of attack for prevention
intrusion correction
57
type of attack on information assets in which the instigator attempts to gain entry into a system or disrupt the normal operation of system with the intent to do malicious harm
intrusion
58
also known as system integrity verifiers
host-based
59
known signatures in network-based
protocol verification, application verification
60
individual agents respond to local threats
partially distributed
61
rules and configuration guidelines governing the implementation and operation of IDPS
site policy
62
detect intrusion and trace incident back
trap and trace systems
63
examines application for abnormal events
application based
64
connects honey pots on a subnet
honey net
65
failure of IDPS to react to attack
false negative