SlideShare a Scribd company logo
What is a false positive and how could it be used to hide a real attack?
Solution
False positives are alerts generated by an IDS because it thinks it has detected a valid attack
against a monitored system,but the attack really is not valid.False Positives are problems because
they create alert noise that can hide a real attack,and then can send you a wild goos chases for
attacks that never relly happened.
A False positive occurs when an IDS generates an alert on either
Network traffic that looks like an attack to the IDS,but isnot an attack.
A real attack that attack doesnot applyto the system being monitored.
A false negative is a real attack that was missed by the IDS, and therefore not alerted on.An IDS
might miss an attack because the attack is not one it recognizes,becuse the IDS overwhelmed or
because the attacker has successfully used a method of evading the IDS.

More Related Content

Similar to What is a false positive and how could it be used to hide a real attac.docx

Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
Piyu Karande
 
Intrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVaultIntrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVault
SOCVault
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
AnonymousEImkf6RGdQ
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systemsvamsi_xmen
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
Tapan Khilar
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
Preshan Pradeepa
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
ijsptm
 
Securing Cyberspace: The Vitality of Intrusion Detection Systems
Securing Cyberspace: The Vitality of Intrusion Detection SystemsSecuring Cyberspace: The Vitality of Intrusion Detection Systems
Securing Cyberspace: The Vitality of Intrusion Detection Systems
Tagx Data
 
Ids
IdsIds
Certified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection SystemsCertified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection Systems
frankvv
 
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdfExplain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
izabellejaeden956
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
MohammedAlmuhaimeed
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
securens
 
Risk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresRisk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresSheloeloe
 
Presentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptxPresentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptx
Yash Sharma
 
Oedipus The King Intrusion
Oedipus The King IntrusionOedipus The King Intrusion
Oedipus The King Intrusion
Elizabeth Temburu
 

Similar to What is a false positive and how could it be used to hide a real attac.docx (17)

Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
Intrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVaultIntrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVault
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
 
Securing Cyberspace: The Vitality of Intrusion Detection Systems
Securing Cyberspace: The Vitality of Intrusion Detection SystemsSecuring Cyberspace: The Vitality of Intrusion Detection Systems
Securing Cyberspace: The Vitality of Intrusion Detection Systems
 
Ids
IdsIds
Ids
 
Certified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection SystemsCertified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection Systems
 
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdfExplain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
 
Risk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresRisk Management — Visual Ids Countermeasures
Risk Management — Visual Ids Countermeasures
 
Presentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptxPresentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptx
 
Oedipus The King Intrusion
Oedipus The King IntrusionOedipus The King Intrusion
Oedipus The King Intrusion
 

More from todd471

What is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docxWhat is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docx
todd471
 
What is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docxWhat is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docx
todd471
 
What is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docxWhat is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docx
todd471
 
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docxWhat is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
todd471
 
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docxWhat is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
todd471
 
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docxWhat is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
todd471
 
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docxWhat is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
todd471
 
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docxWhat is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
todd471
 
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docxWhat is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
todd471
 
What is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docxWhat is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docx
todd471
 
What is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docxWhat is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docx
todd471
 
What is a single entry accounting system-Solution Single entry acco.docx
What is a single entry accounting system-Solution    Single entry acco.docxWhat is a single entry accounting system-Solution    Single entry acco.docx
What is a single entry accounting system-Solution Single entry acco.docx
todd471
 
What impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docxWhat impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docx
todd471
 
What if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docxWhat if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docx
todd471
 
What function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docxWhat function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docx
todd471
 
What exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docxWhat exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docx
todd471
 
What does the host portion of an IP address designate- A- The identi.docx
What does the host portion of an IP address designate-   A- The identi.docxWhat does the host portion of an IP address designate-   A- The identi.docx
What does the host portion of an IP address designate- A- The identi.docx
todd471
 
What effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docxWhat effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docx
todd471
 
What does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docxWhat does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docx
todd471
 
what does literal equation meanSolution 1- Accordi.docx
what does literal equation meanSolution                     1- Accordi.docxwhat does literal equation meanSolution                     1- Accordi.docx
what does literal equation meanSolution 1- Accordi.docx
todd471
 

More from todd471 (20)

What is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docxWhat is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docx
 
What is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docxWhat is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docx
 
What is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docxWhat is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docx
 
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docxWhat is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
 
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docxWhat is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
 
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docxWhat is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
 
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docxWhat is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
 
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docxWhat is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
 
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docxWhat is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
 
What is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docxWhat is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docx
 
What is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docxWhat is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docx
 
What is a single entry accounting system-Solution Single entry acco.docx
What is a single entry accounting system-Solution    Single entry acco.docxWhat is a single entry accounting system-Solution    Single entry acco.docx
What is a single entry accounting system-Solution Single entry acco.docx
 
What impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docxWhat impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docx
 
What if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docxWhat if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docx
 
What function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docxWhat function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docx
 
What exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docxWhat exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docx
 
What does the host portion of an IP address designate- A- The identi.docx
What does the host portion of an IP address designate-   A- The identi.docxWhat does the host portion of an IP address designate-   A- The identi.docx
What does the host portion of an IP address designate- A- The identi.docx
 
What effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docxWhat effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docx
 
What does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docxWhat does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docx
 
what does literal equation meanSolution 1- Accordi.docx
what does literal equation meanSolution                     1- Accordi.docxwhat does literal equation meanSolution                     1- Accordi.docx
what does literal equation meanSolution 1- Accordi.docx
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 

What is a false positive and how could it be used to hide a real attac.docx

  • 1. What is a false positive and how could it be used to hide a real attack? Solution False positives are alerts generated by an IDS because it thinks it has detected a valid attack against a monitored system,but the attack really is not valid.False Positives are problems because they create alert noise that can hide a real attack,and then can send you a wild goos chases for attacks that never relly happened. A False positive occurs when an IDS generates an alert on either Network traffic that looks like an attack to the IDS,but isnot an attack. A real attack that attack doesnot applyto the system being monitored. A false negative is a real attack that was missed by the IDS, and therefore not alerted on.An IDS might miss an attack because the attack is not one it recognizes,becuse the IDS overwhelmed or because the attacker has successfully used a method of evading the IDS.