Intrusion detection systems
(IDS) can be used to monitor network segments (network-based) or individual
systems (host-based). There are two types of IDS: signature-based
and behavior-based. Signature-based IDS cannot recognize new types of attacks,
but instead looks for patterns of previously identified attacks. Behavior-
based IDS builds a profile of a network’s usual activities and compares all
future activities to this profile to detect unusual behaviors.
No comments:
Post a Comment