The abuse probe method: this method to analyze the operation of the system, search the events resemble the patterns of known attacks before. The model is called the attacks a sign of attack. Therefore, this method is called autodetection method of signs. This method has the advantage is the detection of fast and accurate attack, do not give false warnings lead to reduce the ability of the network's activities and help to administrators identify security vulnerabilities in the system. However, this approach has the drawback is not detected the attack is not in the database, the new type of attack, so the system is always updated to the new type of attack.Probe the unusual method: this is the intelligent detector techniques, identified the network's unusual action. The conception of the method of the attack was different from the normal operation. Initially they will store the profiles of the normal operation of the system. The attacks will take actions different than normal and this method can be identified. There are a number of techniques to probe the irregularities of the attacks.The detection threshold level: this technique stressed the measure count normal activities on the network. The thresholds of normal activities is in place. If there is any abnormality, such as logging into the system too the number of regulations, the number of active processes on the CPU, the number one type of packets sent. .. The system that has the sign of attack. · Discovered thanks to the process of self-study: this technique consists of 2 steps, start setting up attack detection system will run in automatic mode and create a profile for the network's normal operation. After the initial period, the system will run in a working mode, conduct the monitoring, detection of abnormal network activities by comparing with the profile has been created. Self learning mode can be run in parallel with the working mode to update his profile but if detected signs of attack, then self study mode is stopped until the attack ends · The unusual discovery of the Protocol: this technique is based on the operation of the Protocol, the system's service to search out invalid packets, extraordinary activities which are the signs of intrusion. This technique is very effective in stopping the scanner, scan the network forms the gate to collect information of system hackers. Probe the unusual method of the system is very effective in detecting the type of denial of service attack DoS. The advantage of this method is to detect the new type of attack, provide additional useful information for the abuse probe method. However, the downside is that they often cause false alerts reduce the performance of the network.
đang được dịch, vui lòng đợi..