SlideShare a Scribd company logo
1 of 1
What is a false positive and how could it be used to hide a real attack?
Solution
False positives are alerts generated by an IDS because it thinks it has detected a valid attack
against a monitored system,but the attack really is not valid.False Positives are problems because
they create alert noise that can hide a real attack,and then can send you a wild goos chases for
attacks that never relly happened.
A False positive occurs when an IDS generates an alert on either
Network traffic that looks like an attack to the IDS,but isnot an attack.
A real attack that attack doesnot applyto the system being monitored.
A false negative is a real attack that was missed by the IDS, and therefore not alerted on.An IDS
might miss an attack because the attack is not one it recognizes,becuse the IDS overwhelmed or
because the attacker has successfully used a method of evading the IDS.

More Related Content

Similar to What is a false positive and how could it be used to hide a real attac.docx

Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detectionPiyu Karande
 
Intrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVaultIntrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVaultSOCVault
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptxAnonymousEImkf6RGdQ
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systemsvamsi_xmen
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection SystemPreshan Pradeepa
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a studyijsptm
 
Certified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection SystemsCertified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection Systemsfrankvv
 
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdfExplain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdfizabellejaeden956
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention MohammedAlmuhaimeed
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system gaurav koriya
 
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...securens
 
Risk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresRisk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresSheloeloe
 
Presentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptxPresentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptxYash Sharma
 

Similar to What is a false positive and how could it be used to hide a real attac.docx (16)

Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
Intrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVaultIntrusion Detection VS Intrusion Prevention | SOCVault
Intrusion Detection VS Intrusion Prevention | SOCVault
 
Intrusion Detection Systems.pptx
Intrusion Detection Systems.pptxIntrusion Detection Systems.pptx
Intrusion Detection Systems.pptx
 
Intrusion Detection Systems
Intrusion Detection SystemsIntrusion Detection Systems
Intrusion Detection Systems
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Intrusion Detection System
Intrusion Detection SystemIntrusion Detection System
Intrusion Detection System
 
Intrusion detection system – a study
Intrusion detection system – a studyIntrusion detection system – a study
Intrusion detection system – a study
 
Ids
IdsIds
Ids
 
Certified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection SystemsCertified Secure - Ineffective Detection Systems
Certified Secure - Ineffective Detection Systems
 
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdfExplain the advantages and disadvantages of misuse-based and anomaly.pdf
Explain the advantages and disadvantages of misuse-based and anomaly.pdf
 
The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention The way of network intrusion and their detection and prevention
The way of network intrusion and their detection and prevention
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
Know The Difference Between Intrusion Detection vs Intrusion Prevention Syste...
 
Risk Management — Visual Ids Countermeasures
Risk Management — Visual Ids CountermeasuresRisk Management — Visual Ids Countermeasures
Risk Management — Visual Ids Countermeasures
 
Presentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptxPresentation (3) cybersecurity wd imp.pptx
Presentation (3) cybersecurity wd imp.pptx
 
Oedipus The King Intrusion
Oedipus The King IntrusionOedipus The King Intrusion
Oedipus The King Intrusion
 

More from todd471

What is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docxWhat is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docxtodd471
 
What is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docxWhat is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docxtodd471
 
What is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docxWhat is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docxtodd471
 
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docxWhat is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docxtodd471
 
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docxWhat is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docxtodd471
 
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docxWhat is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docxtodd471
 
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docxWhat is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docxtodd471
 
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docxWhat is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docxtodd471
 
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docxWhat is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docxtodd471
 
What is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docxWhat is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docxtodd471
 
What is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docxWhat is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docxtodd471
 
What is a single entry accounting system-Solution Single entry acco.docx
What is a single entry accounting system-Solution    Single entry acco.docxWhat is a single entry accounting system-Solution    Single entry acco.docx
What is a single entry accounting system-Solution Single entry acco.docxtodd471
 
What impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docxWhat impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docxtodd471
 
What if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docxWhat if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docxtodd471
 
What function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docxWhat function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docxtodd471
 
What exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docxWhat exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docxtodd471
 
What does the host portion of an IP address designate- A- The identi.docx
What does the host portion of an IP address designate-   A- The identi.docxWhat does the host portion of an IP address designate-   A- The identi.docx
What does the host portion of an IP address designate- A- The identi.docxtodd471
 
What effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docxWhat effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docxtodd471
 
What does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docxWhat does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docxtodd471
 
what does literal equation meanSolution 1- Accordi.docx
what does literal equation meanSolution                     1- Accordi.docxwhat does literal equation meanSolution                     1- Accordi.docx
what does literal equation meanSolution 1- Accordi.docxtodd471
 

More from todd471 (20)

What is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docxWhat is entropy- What is its significance for engineering devices and.docx
What is entropy- What is its significance for engineering devices and.docx
 
What is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docxWhat is an income statement and what information does it communicate-S.docx
What is an income statement and what information does it communicate-S.docx
 
What is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docxWhat is an intangible asset- Consider the characteristics- Provide an.docx
What is an intangible asset- Consider the characteristics- Provide an.docx
 
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docxWhat is Contingent Liabilities-SolutionContingent liabilities are thos.docx
What is Contingent Liabilities-SolutionContingent liabilities are thos.docx
 
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docxWhat is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
What is CORBA- Give a brief Overview-SolutionThe CORBA- which stands f.docx
 
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docxWhat is Cirque de Soleil-'s product and business strategy- Comment spe.docx
What is Cirque de Soleil-'s product and business strategy- Comment spe.docx
 
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docxWhat is black box testing-SolutionBlack Box Testing-- Black box testin.docx
What is black box testing-SolutionBlack Box Testing-- Black box testin.docx
 
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docxWhat is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
What is an ETL plan that Ralph Kimball identifies from the 34 Subsyste.docx
 
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docxWhat is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
What is bit stuffing in CAN messages- Why do we use it -SolutionBit st.docx
 
What is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docxWhat is a valid consideration for planning VLAN traffic across multipl.docx
What is a valid consideration for planning VLAN traffic across multipl.docx
 
What is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docxWhat is a reasons for using layered protocols- What is one possible di.docx
What is a reasons for using layered protocols- What is one possible di.docx
 
What is a single entry accounting system-Solution Single entry acco.docx
What is a single entry accounting system-Solution    Single entry acco.docxWhat is a single entry accounting system-Solution    Single entry acco.docx
What is a single entry accounting system-Solution Single entry acco.docx
 
What impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docxWhat impact does font selection have on readability-SolutionFont selec.docx
What impact does font selection have on readability-SolutionFont selec.docx
 
What if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docxWhat if Source One were to argue that it was merely an agent and was o.docx
What if Source One were to argue that it was merely an agent and was o.docx
 
What function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docxWhat function does feedback play in the work of the manager and how do.docx
What function does feedback play in the work of the manager and how do.docx
 
What exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docxWhat exactly is stress-What is the difference between so-calledSolutio.docx
What exactly is stress-What is the difference between so-calledSolutio.docx
 
What does the host portion of an IP address designate- A- The identi.docx
What does the host portion of an IP address designate-   A- The identi.docxWhat does the host portion of an IP address designate-   A- The identi.docx
What does the host portion of an IP address designate- A- The identi.docx
 
What effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docxWhat effect would the contamination by the following impurities have o.docx
What effect would the contamination by the following impurities have o.docx
 
What does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docxWhat does wave-particle duality of light mean- What are some of the ev.docx
What does wave-particle duality of light mean- What are some of the ev.docx
 
what does literal equation meanSolution 1- Accordi.docx
what does literal equation meanSolution                     1- Accordi.docxwhat does literal equation meanSolution                     1- Accordi.docx
what does literal equation meanSolution 1- Accordi.docx
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

What is a false positive and how could it be used to hide a real attac.docx

  • 1. What is a false positive and how could it be used to hide a real attack? Solution False positives are alerts generated by an IDS because it thinks it has detected a valid attack against a monitored system,but the attack really is not valid.False Positives are problems because they create alert noise that can hide a real attack,and then can send you a wild goos chases for attacks that never relly happened. A False positive occurs when an IDS generates an alert on either Network traffic that looks like an attack to the IDS,but isnot an attack. A real attack that attack doesnot applyto the system being monitored. A false negative is a real attack that was missed by the IDS, and therefore not alerted on.An IDS might miss an attack because the attack is not one it recognizes,becuse the IDS overwhelmed or because the attacker has successfully used a method of evading the IDS.