Which of the following types of signatures is used in an Intrusion Detection System to trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash?
Following are the basic categories of signatures:
Informational (benign): These types of signatures trigger on normal network activity. For example:
ICMP echo requests
The opening or closing of TCP or UDP connections
Reconnaissance: These types of signatures trigger on attacks that uncover resources and hosts that are reachable, as well as any
possible vulnerabilities that they might contain. For example:
Reconnaissance attacks include ping sweeps
DNS queries
Port scanning
Access: These types of signatures trigger on access attacks, which include unauthorized access, unauthorized escalation of privileges,
and access to protected or sensitive data. For example:
Back Orifice
A Unicode attack against the Microsoft IIS
NetBus
DoS: These types of signatures trigger on attacks that attempt to reduce the level of a resource or system, or to cause it to crash. For
example:
TCP SYN floods
The Ping of Death
Smurf
Fraggle
Trinoo
Tribe Flood Network
Paris
1 day agoLudivina
6 days agoRebbecca
12 days agoLettie
17 days agoGearldine
22 days agoRodrigo
27 days agoTanja
2 months agoOzell
2 months agoRuth
2 months agoTawna
2 months agoMa
2 months agoVinnie
2 months agoCarylon
3 months agoJoana
3 months agoDewitt
3 months agoJodi
3 months agoSvetlana
3 months agoIra
3 months agoSharan
4 months agoCharlena
4 months agoElvera
4 months agoVerda
4 months agoAnabel
4 months agoLoren
5 months agoMarshall
5 months ago