Please enable JavaScript.
Coggle requires JavaScript to display documents.
IDS (IDS limitations (What to do next? (When the attack has been detected…
IDS
IDS limitations
-
-
-
Encrypted traffic (TLS, VPN)?
-
-
Same problems with fragmentation and overlapping than FW :Host-based IDSs are not as vulnerable as NIDSs are.
How IDS Works
Input information
Host-specific information: local logs, sytem calls, file system changes
-
-
-
-
-
-
-
-
IDS tuning
-
False Negatives are worse, but too many false positives may render the IDS platform useless
-
-
-