This topic contains a solution. Click here to go to the answer

Author Question: _________ identification takes a very different approach to intrusion detection. The key feature of ... (Read 110 times)

chandani

  • Hero Member
  • *****
  • Posts: 541
_________ identification takes a very different approach to intrusion detection. The key feature of such systems is the use of rules for identifying known penetration or penetrations that would exploit known weaknesses.
 
  Typically the rules used in these systems are specific to the machine and operating system.
  What will be an ideal response?

Question 2

An example of a metric used for profile-based intrusion detection is _________ which is a non-negative integer that may be incremented but not decremented until it is reset by management action.
 
  Examples include the number of logins by a single user during an hour, the number of times a given command is executed during a single user session, and the number of password failures during a minute.
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

xiaomengxian

  • Sr. Member
  • ****
  • Posts: 311
Answer to Question 1

Rule-based penetration

Answer to Question 2

Counter




chandani

  • Member
  • Posts: 541
Reply 2 on: Jul 7, 2018
Gracias!


kjohnson

  • Member
  • Posts: 330
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

Eating food that has been cooked with poppy seeds may cause you to fail a drug screening test, because the seeds contain enough opiate alkaloids to register as a positive.

Did you know?

In 1835 it was discovered that a disease of silkworms known as muscardine could be transferred from one silkworm to another, and was caused by a fungus.

Did you know?

You should not take more than 1,000 mg of vitamin E per day. Doses above this amount increase the risk of bleeding problems that can lead to a stroke.

Did you know?

Most strokes are caused when blood clots move to a blood vessel in the brain and block blood flow to that area. Thrombolytic therapy can be used to dissolve the clot quickly. If given within 3 hours of the first stroke symptoms, this therapy can help limit stroke damage and disability.

Did you know?

Despite claims by manufacturers, the supplement known as Ginkgo biloba was shown in a study of more than 3,000 participants to be ineffective in reducing development of dementia and Alzheimer’s disease in older people.

For a complete list of videos, visit our video library