Question

In: Computer Science

What is promiscuous mode in IDS? What is in-line mode in IDS? When is appropriate to...

What is promiscuous mode in IDS? What is in-line mode in IDS? When is appropriate to use one or the other in your network?

Solutions

Expert Solution

Intrusion Detection System (IDS)- IDS is a system which checks the network traffic for suspicious activities and alerts the administrator when such activities are founded.

IDS works by capturing the packets from traffic in real-time but works on copies of data traffic to detect suspicious activity. This is known as the promiscuous mode in IDS. Therefore, IDS analyze the copy of the data rather than the original forwarded data packet which makes its way to the destination. Thus allowing some malicious traffic to pass before it can respond.

IDS working in inline-mode provide protection from malicious attacks in real time. In inline-mode actual data packet is checked for suspicious activity and therefore can actively block the packet from reaching the destination.    

Appropriate to use in Network

I depends on the network that you are using. Both promiscuous and inline mode has its own advantage and disadvantage depending on the network

For IDS in promiscuous mode -- deploying senor in promiscuous mode does not have an impact on the existing network such as on latency. Moreover, the failure of senor does not impact on the network. But it sometimes cannot stop malicious packets to reach the destination. It is less helpful in stopping the virus and worms.

For IDS in inline mode -- deploying senor in an inline mode upon failure of senor have an impact on the network. It may also affect the performance of the network. But it is helpful in stopping virus and worms from the network.

IDS in inline-mode is more appropriate given that it has well-defined security policies.

   

  


Related Solutions

Firewall and IDS: What’s the difference between IDS and Firewall? What is promiscuous mode in IDS?...
Firewall and IDS: What’s the difference between IDS and Firewall? What is promiscuous mode in IDS? What is in-line mode in IDS? When is appropriate to use one or the other in your network? Visit some firewall & IDS vendors’ site such as Palo Alto Networks, Check Point, Cisco, etc., and select product(s) suitable for your project. Justify your selection.
1) What is the mode, and with what type of data is it most appropriate? What is the median and with what type of data is it most appropriate?
1) What is the mode, and with what type of data is it most appropriate? What is the median and with what type of data is it most appropriate? What is the mean, and with what type of data is it most appropriate? 2) For the following data, indicate which measure of central tendency you should compute. a. IQ scores b. Anxiety scores (which are skewed in the population) c. Blood types d. Course grades (e.g., A, A-, B+, B, etc.) 3) The...
The router is in interface mode when the router prompt is________ Group of answer choices Router(config-Line)#...
The router is in interface mode when the router prompt is________ Group of answer choices Router(config-Line)# Router(config-if)# Router(config)# Router(config-router)# With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router. interface router line global
When is it best to use the mode as a measure of center? Describe what type...
When is it best to use the mode as a measure of center? Describe what type of data would lead you to choosing the mode over the mean or median. If a set of numbers has a standard deviation of zero, what can you say about the numbers? If a set of grades for a class has a large range and a small standard deviation, what can you say about the class? Include an interpretation that is specific to grades...
What is the meaning torsion of structure when it is at first mode ? please explain...
What is the meaning torsion of structure when it is at first mode ? please explain detailedly.
Consider a finite state machine with a control input called mode. When mode = 0, the...
Consider a finite state machine with a control input called mode. When mode = 0, the machine operates as a mod-3 down counter, where the outputs are the count values. When mode = 1, the machine's output progresses through the last 4 digits of your WCU ID (1133) number (1 digit per clock cycle). Complete each of the steps which follow. (a) Draw the state diagram for this machine. (b) Write RTL Verilog code which implements this design. Submit your...
    2.1) What is the kernel mode?     2.2) What is the user mode?     2.3)...
    2.1) What is the kernel mode?     2.2) What is the user mode?     2.3) Which mode has more different instructions?     2.4) Why do we need these two modes in designing an operating system?
What information is embodied in a budget line? What shifts occur in the budget line when...
What information is embodied in a budget line? What shifts occur in the budget line when money income (a) increases and (b) decreases? What shifts occur in the budget line when the price of the product shown on the vertical axis (a) increases and (b) decreases?
2.When is Phi appropriate? 3.When Cramer’s V appropriate? 4.What values can phi take on?
2.When is Phi appropriate? 3.When Cramer’s V appropriate? 4.What values can phi take on?
A) What is the cyclical deficit, and when is it appropriate to have such a deficit?...
A) What is the cyclical deficit, and when is it appropriate to have such a deficit? Why? B) How do automatic stabilizers, on both the expenditure and revenue sides of the budget, respond during a recession? C) Use the table below to answer the following questions. The federal deficit fell from $1,300 billion in 2011 to $680 billion in 2013. How much of this change was due to the growing economy? How much of this change was the result of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT