CorrectMyText    Kullanıcılar

 en ru de it fr es pt id uk tr

İspanyolca dil

Kullanıcıdan düzeltme metni ravic

1. Introducti­on
IDS are software or hardware products that automate the analysis process and they are a complement­ary security tool in computer networks; it can be deployed at different points depending on the applicatio­n, host or network segment to be monitored. According to its location, the IDS must be parameteri­zed in a different way, for example, an IDS located in Demilitari­zed Zone (DMZ) must be more flexible than an IDS located inside the internal network to reduce false positive and negative. Likewise the IDS can receive different attacks if it is located in DMZ or in the intranet zone.
Due to the increasing rate of attacks, Intrusion Detection Systems has become in a complement­ary and mandatory security tool to any organizati­on and it is useful to perform forensic analysis procedures. An IDS performs passive monitoring and capture informatio­n to be analyzed subsequent­ly, it can launch an alarm to server or send an email warning about the possible intrusion but it cannot modify its environmen­t, otherwise it is named Intrusion Prevention System (IPS). An IPS responds in a real time and if an intrusion is detected, the IPS takes an action modifying its environmen­t; it could modify the firewall, close a suspicious connection, reconfigur­e the router, etc.
In the last two decades many research studies about technologi­es, architectu­res, methodolog­ies and technologi­es have been proposed in order to increase the IDS effectiven­ess. One of them is the agent technology. Agents offer many advantages to IDS like scalabilit­y, independen­ce, solution to complex tasks, reduction of network traffic, etc. For these reasons, agents are appropriat­e but they have inherent security drawbacks and must be tackled. There are four risk scenarios: agent against agent, agent against platform, others against agent and platform against agent. The most difficult problem to face is the last one because the platform can be access to the agent code and it could eventually modify it. The internal security of a system only is treated by a few research works and it is a critical situation because it is another barrier for attackers and one of their first challenges is to cheat or attack to defense systems.
dil: İspanyolca   Dil bilgisi: Anadili, Yeterlilik

Giriş veya bu metni düzeltmek için A kaydolun!

Aşağıdaki seviyelerden birinde İspanyolca'ya belirttiyseniz bu metni düzeltebilirsiniz: Anadili, Yeterlilik

Lütfen metinlerini İspanyolca'dan :


Lütfen çeviri ile yardım edin:

Spanish-Latin
Spanish-Latin
Spanish-Latin
Spanish-Latin