Kullanıcıdan düzeltme metni ravic
1. Introduction
IDS are software or hardware products that automate the analysis process and they are a complementary security tool in computer networks; it can be deployed at different points depending on the application, host or network segment to be monitored. According to its location, the IDS must be parameterized in a different way, for example, an IDS located in Demilitarized Zone (DMZ) must be more flexible than an IDS located inside the internal network to reduce false positive and negative. Likewise the IDS can receive different attacks if it is located in DMZ or in the intranet zone.
Due to the increasing rate of attacks, Intrusion Detection Systems has become in a complementary and mandatory security tool to any organization and it is useful to perform forensic analysis procedures. An IDS performs passive monitoring and capture information to be analyzed subsequently, it can launch an alarm to server or send an email warning about the possible intrusion but it cannot modify its environment, otherwise it is named Intrusion Prevention System (IPS). An IPS responds in a real time and if an intrusion is detected, the IPS takes an action modifying its environment; it could modify the firewall, close a suspicious connection, reconfigure the router, etc.
In the last two decades many research studies about technologies, architectures, methodologies and technologies have been proposed in order to increase the IDS effectiveness. One of them is the agent technology. Agents offer many advantages to IDS like scalability, independence, solution to complex tasks, reduction of network traffic, etc. For these reasons, agents are appropriate but they have inherent security drawbacks and must be tackled. There are four risk scenarios: agent against agent, agent against platform, others against agent and platform against agent. The most difficult problem to face is the last one because the platform can be access to the agent code and it could eventually modify it. The internal security of a system only is treated by a few research works and it is a critical situation because it is another barrier for attackers and one of their first challenges is to cheat or attack to defense systems.
dil: İspanyolca
Dil bilgisi: Anadili, Yeterlilik
Giriş veya
bu metni düzeltmek için A kaydolun!
Aşağıdaki seviyelerden birinde
İspanyolca'ya belirttiyseniz bu metni düzeltebilirsiniz:
Anadili, Yeterlilik
Lütfen çeviri ile yardım edin: