Explore BrainMass
Share

Passive and Active Intrusion Detection

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

What is the difference between passive and active intrusion detection? I know that the passive intrusion detection will detect and record intrusion attempts, but it does not take action. The active intrusion detection will detect the attacks and send an alert to the network administrator or take action to block the attack. With that said, why would anyone waste their money on even getting the passive intrusion detection if it only records the attacks and takes no action. I really don't understand. What are the pros and cons of passive and active intrusion detection? What are decoys and how are they used in a network?

© BrainMass Inc. brainmass.com October 25, 2018, 3:49 am ad1c9bdddf
https://brainmass.com/computer-science/networking/passive-active-intrusion-detection-354867

Solution Preview

Passive Vs Active Defense

An Intrusion Detection System (IDS) detects and intrusion attempt. A variety of responses can then be mounted and they are divided into two categories.

1) Active Intrusion Detection System-This will mount an automatic response to the threat. The response can include everything from collecting information regarding the nature of the attack and attacker to blocking the source address, closing connections or restarting a server or ...

Solution Summary

The solution discusses passive and active intrusion detection.

$2.19
See Also This Related BrainMass Solution

Networking Problems WK5

1. Based on the Ainsworth (2007) article, are network security best practices only based on implementing hardware and software solutions? If not, how can one of these network security best practices be customized to the needs or risks present in an organization? How are the risks to a particular organization discovered or established?

2.Based on the Friedlander et al. (2007) article, what are DNS and DNSSEC? Can DNSSEC be implemented effectively by the U.S.?

3. What are some things we need to evaluate when protecting our network?

4.What purpose does a firewall play in an organization?

View Full Posting Details