|Read this whole guide offline with no ads, for a low price!|
Use coupon code "certiguide" to save 20%!
|Need more practice? 300 additional Security+ questions!|
|Get It Here!|
22.214.171.124 Active Detection
As with network based IDSs, host
based IDS technology can feature either active or passive detection.
Active methods used by host-based systems can include:
- Terminating suspicious network connections;
- Shutting down services which are being attacked;
- Shutting off user accounts that are being used
for suspicious activities.
- Attempt to collect more information about the
With Active Detection, when a potential attack is detected, a HIDS may take steps like terminating network connections involved in the attack, shutting down services, logging off and invalidating user accounts which may be involved in the attack, and collecting further information about the attack and attacker.
|If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!|
Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.