Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What are the limitations of network intrusion detection systems?

0
Posted

What are the limitations of network intrusion detection systems?

0

Consider the following limitations: Address spoofing/proxying: One goal of intrusion detection is to point fingers at who is attacking you. This can be difficult for a number of reasons. In ‘Smurf’ attack, for example, you receive thousands of replies from a packet that you never sent. The NIDS and detect those replies, but cannot discover who sent the forged packet. In TCP Sequence Number Prediction, forged IP addresses are used so that the NIDS does not know precisely where the intruder is coming from. Finally, most intruders will ‘bounce’ their attacks via FTP or Web proxies, or stage their attacks from other sites they have broken into. Thus, it will be very difficult to find out who is attacking your site, and configuring IP address filters in your firewall won’t help. Resource limitation: NIDS suffer from the fact that it can take extensive resources to keep up with hackers. Most NIDS reassemble TCP streams, but few reassemble packets (because of the memory and CPU resources requ

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123