Respuesta :

The correct answer for this question is this one: "anomaly, network." Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


ACCESS MORE
EDU ACCESS
Universidad de Mexico