Front | Back |
Access Control
|
System includes a number of components, depending on the system's needs for authentication and authorization. Strong authentication requires at least 2 forms of authentication (*What a user knows. *What a user has. *What a user is. *What a user produces.)
|
Active Vulnerability Scanner
|
Is a scanner that initates traffic on the network in order to determine security holes.
|
Alarm (AKA Alert)
|
An indication that a system has just been attacked and/or continues to be under attack.
|
Alarm Clustering
|
Produces unified descriptions of attacks from alarms produced by multiple IDS. In order to be effective, the proposed system takes into account two characteristics of IDS: (I) for a given attack, different sensors may produce a number of alarms reporting different attack descriptions; and (II) a certain attack description may be produced by the IDS in response to different types of attack.
|
Alarm Compaction
|
The process of classifying the attack alerts that an intrusion detection system produces in order to distinguish/sort false positives from actual attacks more efficiently.
|
Alarm Filtering
|
The process of classifying the attack alerts that an IDS produces in order to distinguish and sort false positives from actual attacks more efficiently.
|
Alert (AKA Alarm)
|
An indication that a system has just been attacked and/or continues to be under attack.
|
Application Protocol Verification
|
The higher-order protocols are examined for unexpected packet behavior, or improper use.
|
Application-based IDS (AppIDS)
|
Examines an application for abnormal events by looking at the files created by the application and looking for occurrences that would indicate that there is a problem in the normal interaction between the users, the application, and the data.
|
Asynchronous Token
|
Use a challenge-response system, in which the server challenges the user during login with a numerical sequence.
|
Attack Protocol
|
Is a series of steps of processes used by an attacker, in a logical sequence, to launch an attack against a target system or network.
|
Back-hack
|
The reverse process of finding out who is hacking into a system.
|
Behavior-based IDS (AKA Statistical anomaly-based IDS)
|
Collects statistical summaries by observing traffic that is known to be normal. This IDS can detect new types of attacks, because it is looking for abnormal activity of any type.
|
Centralized IDS
|
Is a control strategy that implements and manages all IDS control functions in a central location.
|
Clipping Level
|
is when the measured activity is outside the baseline parameters. (Once the baseline is established, the stat IDS will periodically sample network activity, and, using statistical methods, compare the sampled network activity to this baseline.)
|