The difference between a network based intrusion detection system and a host based detection system

Updated on technology 2024-03-04
7 answers
  1. Anonymous users2024-02-06

    First, the nature is different.

    1. Network-based intrusion detection system.

    Using the original network packet as the data source, it sets the network card of the detection host in the network data to promiscuous mode, and the host receives and analyzes the packets flowing in the network in real time.

    This allows you to detect the presence of intrusions.

    2. Host-based intrusion detection systems (HIDS) appeared in the early 80s of the 20th century, when the network scale was still relatively small, and the networks were not fully interconnected. In such an environment, it is relatively easy to check the audit trail of suspicious behavior, and since there were very few intrusions at the time, subsequent attacks could be prevented by post-mortem analysis.

    Second, the principle is different.

    1. Network-based intrusion detection system: Usually utilizes a network adapter running in random mode.

    to detect and analyze all communication services through the network in real time and his attack identification module.

    2. Based on the host intrusion detection system: audit records are used, but the host can automatically detect and respond accurately and timely. In general, HIDS monitors and analyzes systems, events, and security records.

  2. Anonymous users2024-02-05

    Network-based intrusion detection is deployed in the form of devices on the bypass, mainly through traffic packet detection invention; Host-based intrusion detection systems are deployed directly on the host in the form of software.

  3. Anonymous users2024-02-04

    The Internet, which refers to the entire Internet. Host means a single or multiple hosts. The goal is clear.

  4. Anonymous users2024-02-03

    1) Monitor specific system activities.

    2) Very dusty and suitable for use in encrypted and exchanged environments.

    3) Near real-time detection and response.

    4) Potato poor does not require additional hardware.

  5. Anonymous users2024-02-02

    Answer]: The intrusion detection system (IDS) uses intrusion detection technology to monitor the network and the systems on it, and carries out different security actions according to the monitoring results to minimize the possible intrusion hazards. According to the original data, the intrusion detection system can be divided into host-based intrusion detection system, network-based intrusion detection system and application-based invisibility detection system; According to the detection principle, the intrusion detection system can be divided into abnormal intrusion detection and misuse intrusion detection. According to the architecture, the intrusion detection system can be divided into three types: centralized, hierarchical and collaborative; According to the working mode, the intrusion detection system can be divided into offline detection system and ** detection system.

  6. Anonymous users2024-02-01

    Answer]: The intrusion detection system (IDS) uses intrusion detection technology to monitor the network and the systems on it, and carries out different security actions according to the monitoring results to minimize possible intrusion hazards. According to the original data, the intrusion detection system can be divided into host-based in-depth detection system, network-based in-depth detection system and application-based in-depth detection system; According to the detection principle, the intrusion detection system can be divided into abnormal intrusion detection and misuse intrusion detection; According to the architecture, the intrusion detection system can be divided into three types: centralized, hierarchical and collaborative; According to the working mode, the intrusion detection system can be divided into the detection system and the detection system.

  7. Anonymous users2024-01-31

    Its advantages are fast detection speed, good concealment, not easy to be attacked, and less consumption of hidden resources to the host;

    Missing Regret Link is that some attacks are sent by the server's keyboard, which does not pass through the network, so it cannot be recognized, and the false alarm rate is high.

Related questions
13 answers2024-03-04

First of all, according to the characteristics of the computer laboratory, the Q&A function module can use the existing LAN topology to input and transmit information in the network environment, and store it in the host database server. Switch between group chat and one-on-one private chat with control over how you talk. >>>More

21 answers2024-03-04

I don't have a good way, so let's look online first.

4 answers2024-03-04

Summary. Hello, you can improve the performance of embedded ARM programs in the following ways: Writing C programs with a certain style can help the C compiler generate faster ARM **. >>>More

3 answers2024-03-04

Computer network systems.

Landlord, I'll help you. >>>More