subject
Computers and Technology, 21.12.2019 02:31 lcar61

Aparticular vendor uses the following approach to intrusion detection.16 the company maintains a large number of honeypots distributed across the internet. to a potential attacker, these honeypots look like vulnerable systems. consequently, the honeypots attract many attacks and, in particular, new attacks tend to show up on the honeypots soon after— sometimes even during—their development. whenever a new attack is detected at one of the honeypots, the vendor immediately develops a signature and distributes the resulting signature to all systems using its product. the actual derivation of the signature is generally a manual process.

a. what are the advantages, if any, of this approach as compared to a standard signature-based system?
b. what are the advantages, if any, of this approach as compared to a standard anomaly-based system?
c. using the terminology given in this chapter, the system outlined in this problem would be classified as a signature-based ids, not an anomaly-based ids. why?
d. the definition of signature-based and anomaly-based ids are not standardized.17 the vendor of the system outlined in this problem refers to it as an anomaly-based ids. why might they insist on calling it an anomaly-based ids, when your well-nigh infallible author would classify it as a signature-based system?

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:20
The pyraminx is a rubik's cube-type toy in the shape of a tetrahedron (not a pyramid). the pyraminx shown below has edges 15\,\text{cm}15cm15, space, c, m long and vertical height h=12.2\,\text{cm}h=12.2cmh, equals, 12, point, 2, space, c, m. the triangle drawn with dashed lines is a right triangle. what is the distance rrr? round your answer to the nearest tenth.
Answers: 1
question
Computers and Technology, 23.06.2019 01:30
Which tab is used to change the theme of a photo album slide show? a. design b. view c. transitions d. home
Answers: 1
question
Computers and Technology, 23.06.2019 07:00
What are three software programs for mobile computing?
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
What is the total resistance in a circuit that contains three 60 ohm resistors connected in a series? a. 20 ohms b. 120 ohms c. 60 ohms d. 180 ohms
Answers: 2
You know the right answer?
Aparticular vendor uses the following approach to intrusion detection.16 the company maintains a lar...
Questions
question
Mathematics, 10.03.2021 20:00
question
Mathematics, 10.03.2021 20:00
question
Mathematics, 10.03.2021 20:00
question
Mathematics, 10.03.2021 20:00
Questions on the website: 13722367