Knowledge (XXG)

Application protocol-based intrusion detection system

Source 📝

426: 63: 22: 369: 35: 41: 463: 139: 111: 410: 267:
However at a more advanced level the APIDS can learn, be taught or even reduce what is often an infinite protocol set, to an acceptable understanding of the
118: 125: 492: 107: 87:
of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be
482: 456: 176: 158: 49: 132: 403: 84: 449: 80: 487: 96: 396: 287: 237: 198: 313: 214: 73: 226: 92: 293: 202: 88: 218: 217:
of the protocol and will typically consist of a system or agent that would typically sit between a
222: 264:
At a basic level an APIDS would look for, and enforce, the correct (legal) use of the protocol.
433: 380: 278:", thus should that application be subverted or changed, so will the fingerprint change. 338: 271:
of that application protocol that is used by the application being monitored/protected.
249: 476: 275: 368: 425: 245: 233: 376: 253: 274:
Thus, an APIDS, correctly configured, will allow an application to be "
229:
and analyzing the application protocol between two connected devices.
268: 201:
that focuses its monitoring and analysis on a specific application
79:
Please help to demonstrate the notability of the topic by citing
241: 56: 15: 437: 384: 108:"Application protocol-based intrusion detection system" 191:
application protocol-based intrusion detection system
339:"What is an Intrusion Detection System (IDS)? | IBM" 232:A typical place for an APIDS would be between a 213:An APIDS will monitor the dynamic behavior and 457: 404: 205:or protocols in use by the computing system. 8: 50:Learn how and when to remove these messages 464: 450: 411: 397: 177:Learn how and when to remove this message 159:Learn how and when to remove this message 314:"6 Types of Intrusion Detection System" 305: 7: 432:This security software article is a 422: 420: 365: 363: 436:. You can help Knowledge (XXG) by 383:. You can help Knowledge (XXG) by 375:This article related to a type of 14: 31:This article has multiple issues. 493:Computer security software stubs 424: 367: 318:internationalsecurityjournal.com 61: 20: 72:may not meet Knowledge (XXG)'s 39:or discuss these issues on the 294:Web application firewall (WAF) 1: 74:general notability guideline 483:Intrusion detection systems 260:Monitoring dynamic behavior 509: 419: 362: 288:Intrusion detection system 238:database management system 199:intrusion detection system 81:reliable secondary sources 70:The topic of this article 252:as it interacts with the 244:protocol specific to the 488:Software type stubs 76: 445: 444: 392: 391: 240:, monitoring the 187: 186: 179: 169: 168: 161: 143: 71: 54: 500: 466: 459: 452: 428: 421: 413: 406: 399: 371: 364: 354: 353: 351: 350: 335: 329: 328: 326: 325: 310: 182: 175: 164: 157: 153: 150: 144: 142: 101: 65: 64: 57: 46: 24: 23: 16: 508: 507: 503: 502: 501: 499: 498: 497: 473: 472: 471: 470: 418: 417: 360: 358: 357: 348: 346: 337: 336: 332: 323: 321: 312: 311: 307: 302: 284: 262: 211: 183: 172: 171: 170: 165: 154: 148: 145: 102: 100: 78: 66: 62: 25: 21: 12: 11: 5: 506: 504: 496: 495: 490: 485: 475: 474: 469: 468: 461: 454: 446: 443: 442: 429: 416: 415: 408: 401: 393: 390: 389: 372: 356: 355: 330: 304: 303: 301: 298: 297: 296: 291: 283: 280: 261: 258: 250:business logic 221:, or group of 210: 207: 185: 184: 167: 166: 69: 67: 60: 55: 29: 28: 26: 19: 13: 10: 9: 6: 4: 3: 2: 505: 494: 491: 489: 486: 484: 481: 480: 478: 467: 462: 460: 455: 453: 448: 447: 441: 439: 435: 430: 427: 423: 414: 409: 407: 402: 400: 395: 394: 388: 386: 382: 378: 373: 370: 366: 361: 344: 340: 334: 331: 319: 315: 309: 306: 299: 295: 292: 289: 286: 285: 281: 279: 277: 276:fingerprinted 272: 270: 265: 259: 257: 255: 251: 247: 243: 239: 235: 230: 228: 224: 220: 216: 208: 206: 204: 200: 196: 192: 181: 178: 163: 160: 152: 141: 138: 134: 131: 127: 124: 120: 117: 113: 110: –  109: 105: 104:Find sources: 98: 94: 90: 86: 82: 75: 68: 59: 58: 53: 51: 44: 43: 38: 37: 32: 27: 18: 17: 438:expanding it 431: 385:expanding it 374: 359: 347:. Retrieved 345:. 2023-04-19 342: 333: 322:. Retrieved 320:. 2024-04-01 317: 308: 273: 266: 263: 231: 212: 194: 190: 188: 173: 155: 146: 136: 129: 122: 115: 103: 47: 40: 34: 33:Please help 30: 343:www.ibm.com 85:independent 477:Categories 349:2024-07-09 324:2024-07-09 300:References 246:middleware 234:web server 227:monitoring 149:April 2012 119:newspapers 93:redirected 36:improve it 83:that are 42:talk page 377:software 282:See also 254:database 236:and the 209:Overview 203:protocol 197:) is an 223:servers 219:process 133:scholar 97:deleted 269:subset 135:  128:  121:  114:  106:  89:merged 379:is a 290:(IDS) 215:state 195:APIDS 140:JSTOR 126:books 95:, or 434:stub 381:stub 112:news 242:SQL 189:An 479:: 341:. 316:. 256:. 225:, 91:, 45:. 465:e 458:t 451:v 440:. 412:e 405:t 398:v 387:. 352:. 327:. 248:/ 193:( 180:) 174:( 162:) 156:( 151:) 147:( 137:· 130:· 123:· 116:· 99:. 77:. 52:) 48:(

Index

improve it
talk page
Learn how and when to remove these messages
general notability guideline
reliable secondary sources
independent
merged
redirected
deleted
"Application protocol-based intrusion detection system"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Learn how and when to remove this message
intrusion detection system
protocol
state
process
servers
monitoring
web server
database management system
SQL
middleware
business logic
database
subset

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.