What are the three types of malicious traffic detection methods?
A) Signature, policy, and anomaly based
B) IDS, IPS, and IRS based
C) NIDS, HIPS, and NIPS based
D) Symmetric, asymmetric, and transparent based
A
Explanation: Consider the following approaches for detecting malicious traffic:
• Signature-based detection
• Policy-based detection
• Anomaly-based detection
The primary method used to detect and prevent attacks using IDS or IPS technologies is signature based. Another approach to IDS/IPS detection is policy based. With a policy-based approach, the IDS/IPS device needs a specific declaration of the security policy. A third approach to detecting or preventing malicious traffic is anomaly based. This approach is prone to false positives because a normal condition is difficult to measurably define.
You might also like to view...
The character spacing option expands or compresses spacing between characters by a specified number of points
Indicate whether the statement is true or false
Organized crime groups want to remain unrecognized and have no impact within their communities
Indicate whether the statement is true or false.