Term
Stateful protocol analysis |
|
Definition
Examines the default usage of the protocols. Any deviation will flag an alert. |
|
|
Term
Signature Recognition, aka misuse detection |
|
Definition
Tries to identify events that misuse a system. |
|
|
Term
|
Definition
It detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system; quite famous for false positives. |
|
|
Term
IDS, packet logger and sniffer are the three main modes of which application |
|
Definition
Three main modes of Snort |
|
|