Term
| Stateful protocol analysis |
|
Definition
| Examines the default usage of the protocols. Any deviation will flag an alert. |
|
|
Term
| Signature Recognition, aka misuse detection |
|
Definition
| Tries to identify events that misuse a system. |
|
|
Term
|
Definition
| It detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system; quite famous for false positives. |
|
|
Term
| IDS, packet logger and sniffer are the three main modes of which application |
|
Definition
| Three main modes of Snort |
|
|