ExamGecko
Question list
Search
Search

Related questions











Question 360 - 312-50v12 discussion

Report
Export

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

A.
Produces less false positives
Answers
A.
Produces less false positives
B.
Can identify unknown attacks
Answers
B.
Can identify unknown attacks
C.
Requires vendor updates for a new threat
Answers
C.
Requires vendor updates for a new threat
D.
Cannot deal with encrypted network traffic
Answers
D.
Cannot deal with encrypted network traffic
Suggested answer: B

Explanation:

An anomaly-based intrusion detection system is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature-based systems, which can only detect attacks for which a signature has previously been created.

In order to positively identify attack traffic, the system must be taught to recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors is built) and the testing phase (where current traffic is compared with the profile created in the training phase). Anomalies are detected in several ways, most often with artificial intelligence type techniques. Systems using artificial neural networks have been used to great effect. Another method is to define what normal usage of the system comprises using a strict mathematical model, and flag any deviation from this as an attack. This is known as strict anomaly detection.[3] Other techniques used to detect anomalies include data mining methods, grammar-based methods, and the Artificial Immune System.

Network-based anomalous intrusion detection systems often provide a second line of defense to detect anomalous traffic at the physical and network layers after it has passed through a firewall or other security appliance on the border of a network. Host-based anomalous intrusion detection systems are one of the last layers of defense and reside on computer endpoints. They allow for finetuned, granular protection of endpoints at the application level.

Anomaly-based Intrusion Detection at both the network and host levels have a few shortcomings; namely a high false-positive rate and the ability to be fooled by a correctly delivered attack. Attempts have been made to address these issues through techniques used by PAYL and MCPAD.

asked 18/09/2024
Manuel Guerrero Rojas
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first