Recall that the anomaly-based IDS example presented in this chapter is based on file-use statistics. The expected file use percentages (the Hi values in Table 8.4) are periodically updated using...


Recall that the anomaly-based IDS example presented in this chapter is based on file-use statistics. The expected file use percentages (the Hi values in Table 8.4) are periodically updated using equation (8.3), which can be viewed as a moving average.


a. Why is it necessary to update the expected file use percentages?


b. When we update the expected file use percentages, it creates a potential avenue of attack for Trudy. How and why is this the case?


c. Discuss a different generic approach to constructing and updating an anomaly-based IDS.



Dec 20, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here