2. Analysis technologies
2.1 Scenario-based detection
Scenario-based detection is based on accumulated knowledge of attacks and specific vulnerabilities in information systems, operating systems and applications. The intrusion detection system contains information on these vulnerabilities and searches for attempts to exploit them. When such an attempt is detected, an alert is generated.
In other words, any action that is not explicitly identified as a misuse of the information system is considered acceptable. Note that scenario-based detection covers more than just known attacks. A security policy can explicitly declare events as "undesirable" without any associated vulnerability. For example, certain protocols such as SNMP can be banned from a network regardless of any vulnerability....
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Analysis technologies
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
References
- (1) - WOOD (M.), ERLINGER (M.) - Intrusion Detection Message Exchange Requirements. - IETF (22 oct. 2002). http://www.ietf.org/internet-drafts/draft-ietf-idwg-requirements-10.txt
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!