PrepAway - Latest Free Exam Questions & Answers

Which of the following kind of IDS is in use?

Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data.
As rumors of a layoff began to spread, the IDS alerted the network administrator that access to
sensitive client files had risen far above normal. Which of the following kind of IDS is in use?

PrepAway - Latest Free Exam Questions & Answers

A.
Protocol based

B.
Heuristic based

C.
Signature based

D.
Anomaly based

Explanation:
Most intrusion detection systems (IDS) are what is known as signature-based. This means that
they operate in much the same way as a virus scanner, by searching for a known identity – or
signature – for each specific intrusion event. And, while signature-based IDS is very efficient at
sniffing out known methods of attack, it does, like anti-virus software, depend on receiving regular
signature updates, to keep in touch with variations in hacker technique. In other words, signaturebased IDS is only as good as its database of stored signatures.
Any organization wanting to implement a more thorough – and hence safer – solution, should
consider what we call anomaly-based IDS. By its nature, anomaly-based IDS is a rather more
complex creature. In network traffic terms, it captures all the headers of the IP packets running
towards the network. From this, it filters out all known and legal traffic, including web traffic to the
organization’s web server, mail traffic to and from its mail server, outgoing web traffic from
company employees and DNS traffic to and from its DNS server.
There are other equally obvious advantages to using anomaly-based IDS. For example, because it
detects any traffic that is new or unusual, the anomaly method is particularly good at identifying
sweeps and probes towards network hardware. It can, therefore, give early warnings of potential
intrusions, because probes and scans are the predecessors of all attacks. And this applies equally
to any new service installed on any item of hardware – for example, Telnet deployed on a network
router for maintenance purposes and forgotten about when the maintenance was finished. This

makes anomaly-based IDS perfect for detecting anything from port anomalies and web anomalies
to mis-formed attacks, where the URL is deliberately mis-typed.


Leave a Reply