Question

Q1: Discuss the host and network based intrusion detection system Q2: Discuss the different components of...

Q1: Discuss the host and network based intrusion detection system Q2: Discuss the different components of snort with the appropriate diagram Q3:Error Correction (Hamming Code) The following is a corrupted ECC data. 101101101100 Find out the actual data (after removing ECC bits). Q4: Explain Raid0, Raid1, and Raid2

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer1 :

Network-based IDS:

These kinds of IDS are deliberately situated in a network to recognize any assault on the hosts of that network. To catch every one of the information going through the network, you have to position your IDS at the passage and leave purpose of information from your network to the outside world. You can likewise position a few IDS close to the vital places of your inside network, contingent upon the dimension of security required in your network. Since a network-based IDS need to screen every one of the information going through the network, it should be quick to break down the traffic and should drop as meager traffic as could be expected under the circumstances.

Host-based IDS:

They are introduced in a host and they can screen deals that are beginning and going to that specific hosts as it were. On the off chance that there are assaults in some other piece of the network, they won't be recognized by the host-based IDS.. aside from observing approaching and active traffic, a host-based IDS can likewise break down the record arrangement of a host, clients' login exercises, running procedures, information honesty and so forth a portion of the benefits of this kind of IDS are:

  • They are fit for checking if an attack was effective or not, while a network-based IDS just give a signal of the attack.
  • They can screen every one of clients' exercises which is preposterous in a network-based framework
  • They are equipped for recognizing assaults that begin from inside the host.
  • A host-based framework can dissect the unscrambled traffic to discover assault signature-in this manner enabling them to screen scrambled traffic.
  • They don't require any additional equipment since they can be introduced in the current host servers.
  • They are practical for a little scale network having a couple of hosts.

DEAR, PLEASE RATE THE ANSWER IF HELPS ELSE LET ME KNOW YOUR DOUBT ( HAPPY TO HELP).

KINDLY POST SEPARATELY AS WE ARE RESTRICTED TO SUBMIT ONLY ONE ANSWER AT A TIME.

THANK YOU!!!

Add a comment
Know the answer?
Add Answer to:
Q1: Discuss the host and network based intrusion detection system Q2: Discuss the different components of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Q1 In your own words, provide an official definition of Network Management (NM) and briefly discuss...

    Q1 In your own words, provide an official definition of Network Management (NM) and briefly discuss an example (other than IT) than can best support your definition (refer to the book’s example/analogy). Answer: Q2 List the different entities that have an interest in NM and discuss their concerns from the perspective of their business model. Answer: Q3 Outline all major challenges facing NM and briefly discuss each one of them. Answer: Q4 Provide one and only one example of a...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • X86 Assembly language lab: TITLE Lab 3: assembly language fundamentals               ;;;;; Q1: Don't...

    X86 Assembly language lab: TITLE Lab 3: assembly language fundamentals               ;;;;; Q1: Don't forget to document your program            ; Name:Yuyan Wang ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;; Answer each question below by writing code at the APPROPRIATE places in the file. ;;;;; Hint: the appropriate place is not always right below the question. ;;;;; Q2: Write the directive to bring in the IO library           ;;;;; Q3: Create a constant called MAX and initialize it to 150...

  • Q1 Cindy Ho, VP of Finance at Discrete Components, Inc. (DCI), theorizes that the discount level...

    Q1 Cindy Ho, VP of Finance at Discrete Components, Inc. (DCI), theorizes that the discount level offered to credit customers affects the average collection period on credit sales. Accordingly, she has designed an experiment to test her theory using four sales discount rates (0%, 2%, 4%, and 6%) by randomly assigning five customers to each sales discount rate. An analysis of Cindy's data produced the following ANOVA table. Source of Variation SS df MS F Treatment 1844.2 3 614.7333 7.568277...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT