A traditional NIDS with two sensors on different network segments and to communicate with a control station.
Advantages
• Low cost: Since NIDS just installed in the key positions that can monitor traffic system throughout the network should not need to load software on the machine and manage the entire network.
• Detect the attack but HIDs ignored: Unlike HIDS, NIDS check header of all packets so it does not overlook the signs from here. For example, many DoS attacks, Teardrop (split) only be detected when viewing the header of the packet flows on the network.
• Shortness of removing trace (evidence): The information stored in the log file may be intruder modified to mask intrusion activities, in this situation hard HIDs have enough information to act. NIDS uses the current traffic on the network to detect intrusions. Thus, the intruder can not remove traces of attack. The information captured is not just the attacks that contain all the information supporting the verification and accused intruder.
• Detect and respond promptly: NIDS detect attacks once happened, thus alerting and dealing can be done faster. Example: A hacker perform DoS attacks based on NIDS TCP can be detected and prevented immediately by sending TCP reset request to stop attacks before they infiltrate and disrupt the victim machine.
• Taking Independent high: Error system without any significant impact on the work of the machines on the network. They run on a dedicated system easy to install; simply open the device, make a few changes to the configuration and plug them into the network at a position that allows it to control the flow sensitivity.
đang được dịch, vui lòng đợi..
