Intrusion detection system synonyms

Category:
Part of speech:
A formal record or log of the financial transactions of an organization or system, especially such a computerized record
0
0
Exploit is defined as to use someone or something to achieve one's own purposes.
0
0
The art or study of formal debate; argumentation.
0
0
An inappropriate or unwelcome addition.
0
0
To enter or record in a log
0
0
The definition of a virus is an extremely tiny parasite that can only reproduce if it is within a living being, or anything that corrupts something else.
0
0
A security appliance or software running on some device that tries to detect and warn of ongoing computer system cracks or attempted cracks in real time or near-real time. Intrusion detection systems fall into three broad categories: anomaly based, pattern based, and specification based. The first two are the most widely used types; the last one is still in its infancy. A security appliance or software running on some device that tries to detect and warn of ongoing computer system cracks or attempted cracks in real time or near-real time. Intrusion detection systems fall into three broad categories: anomaly based, pattern based, and specification based. The first two are the most widely used types; the last one is still in its infancy. Anomaly-based IDSes treat all exposed behavior of systems, or the network that is unknown to them, as a potential attack. These systems require extensive training of the IDS so that it can distinguish good from bad traffic. Pattern-based IDSes assume that attack patterns are previously known and therefore can be detected. Because these IDSes cannot detect new attack types, they require constant maintenance to incorporate new attacks. Specification-based IDSes look for states of the system known to be undesirable, and upon detection of such a state, they report an intrusion. Common in all systems is that intrusion-detection analysts review the logs that are generated and other available network information (such as traffic patterns, unusual open ports, or unexpected running processes) to look for suspected or real intrusions. This process is time consuming and requires considerable expertise on the part of the security analysts. A trend toward more automated Intrusion Prevention Systems that actively step in and limit systems access can be observed. In March 2004, Hewlett-Packard Company officials said that their software engineers had developed software that they believed could slow the spread of Internet worms and viruses. Tentatively dubbed “Virus Throttler,” this software not only identified and alerted professionals to suspicious network traffic but also caused some of the computer’s functions to slow down so that the worm or virus is impeded. This capability was meant to give the professional the needed time to remove the cyber intruder. Shortly after announcing the package, Hewlett-Packard shelved it for several months because of insurmountable difficulties with integrating it into Microsoft’s Windows operating systems. The difficulties were resolved. In Brief. HP Strikes at Worms. The Globe and Mail, December 2, 2004, p. B11; Symantec Security Response. Glossary. [Online, July 15, 2004.] Symantec Security Response Website. http://securityresponse.symantec.com/avcenter/refa.html.
0
0
(Computing) A self-replicating program that propagates through a network.
0
0
Find another word for intrusion detection system. In this page you can discover 8 synonyms, antonyms, idiomatic expressions, and related words for intrusion detection system, like: audit trail, exploit, forensics, intrusion, log, virus, vulnerabilities of computers and worm.