Site News


A survey, shows that less then 40% of the British public feel they are well informed about science.

New Articles - Earth's Carbon Cycle Ultra Sonic Frogs Environmental Niche & Dinosaurs Seismic Waves Global Warming Life Support Systems Introduction to the Big Bang The Problem of Acid Rain

Our science section is in production with a proposed 1 Mar 07 "Grand launch" date.


The Linux Convert site explains how, even today, building your own linux box can be cheaper than getting an off the shelf Windows PC. There is a new article on why you should use linux there now.

New articles: Firewall Bypass Attack Snort For Newbies Malware and Intrusions Intrusion Detection Systems Malware, Trojans and Virus infections and Infection Removal

If you have any comments or suggestions for topics we should cover under the technology banner then please stop by the discussion board and let us know.

Intrusion Detection Systems

Specific requirements of this IDS

Additionally, where such programs rely on comparison on anomalous and normal traffic, they face the problem of identifying identify normal patterns of network traffic. If they are analysing normal patterns at a time when an attack is taking place, then they are liable to store such attacks as part of the normal pattern of behaviour.

One of the main dangers of this approach is the generation of false negative results. That is, the IDS may fail to detect an attack, particularly when it involves a new and unforeseen exploitation of network vulnerabilities that seem to fit into the pattern of normal use. Thus an attacker can use the same exploit to gain access to resources and remain undetected and unsuspected.

A further problem is the identification of false positives. There are many possible variations in legitimate network traffic that may appear anomalous inter-organisational changes, variations in the business world, rerouting of activity from one node to another etc. In terms of log file analysis, however, this is more of an inconvenience for the administrator who may be alerted unnecessarily. False positives are more problematic with real-time IDS systems that may stop or quarantine network traffic in response to imaginary attacks.

Page 1 - Page 2 - Page 3 - Page 4 - Page 5 - Page 6 - Page 7

XHTML CSS level 2 W3 Sites Any Browser GEO Url


RSS Feed

News Provided By The BBC