As it is Chegg policy to answer one question per answer. Hence,
I am answering the first question and request you to post the rest
of the question individually. Thank you
What
classification systems and descriptions are
used?
- IDPs also called Intrusion Detection and Prevention System are
being used to secure the network from a different type of network
vulnerabilities. There are multiple types and description which are
being used to classify the system. They are as follows:
- Knowing the type of intruders
- In this classification, we need to classify the intruders
whether they are external intruders or internal intruders.
- The external intruders are the intruders which launch attack
from outside the network and similarly, the internal intruders are
the intruders that launch an attack from inside the network.
- Knowing the type of intrusion
- While classifying the attack it becomes
very important to identify the intrusion type whether the attackers
are penetrating the security system or is it some kind of DoS
attack, etc.
- It also covers whether the attack was due to any vulnerability
that lies in the network or any leakage from the organization or
the attacker is making use of any malicious attack.
- From the detection techniques that are being used by
IDPs
- It also is classified based on the
techniques which are being used by the IDPs in the network. There
are namely three types of techniques. They are as follows:
- Detection based on signatures
- Detection based on anomaly-based
detection.
- Detection based on Stateful Protocol
Analysis
- From the type of IDPs used
- They are also classified based on the
type of IDPs that are being used by the network.
They are as follows:
- Network-based IDPs
- Network Behaviour Analysis
- Wireless based IDPs
- Host-based IDPs
Hence, these are all the classification systems and descriptions
that are being used for the classification of IDPs.