What are the characteristics of anomaly based IDS?

It models the normal usage of network as a noise characterization
It doesn’t detect novel attacks
Anything distinct from the noise is not assumed to be intrusion activity
It detects based on signature
It models the normal usage of network as a noise characterization  

Related posts

What are the characteristics of Host based IDS?
A. The host operating system logs in the audit information
B. Logs includes logins,file opens and program executions
C. Logs are analysed to detect tails of intrusion
D. All of the mentioned
Which one of the following is not a secondary storage?
A. Magnetic disks
B. Magnetic tapes
C. RAM
D. None of the mentioned
What are the drawbacks of the host based IDS?
A. Unselective logging of messages may increase the audit burdens
B. Selective logging runs the risk of missed attacks
C. They are very fast to detect
D. They have to be programmed for new patterns
What is the breach of integrity?
A. This type of violation involves unauthorized reading of data
B. This violation involves unauthorized modification of data
C. This violation involves unauthorized destruction of data
D. This violation involves unauthorized use of resources
What are the two features of a tripwire file system?
A. It is a tool to monitor file systems
B. It is used to automatically take corrective action
C. It is used to secure UNIX system
D. None of the mentioned
A swap space can reside in ___________
A. Separate disk partition
B. RAM
C. Cache
D. None of the mentioned
The time for the disk arm to move the heads to the cylinder containing the desired sector is called ___________
A. disk time
B. seek time
C. arm time
D. sector time

Leave a Reply

Your email address will not be published. Required fields are marked *