426:
63:
22:
369:
35:
41:
463:
139:
111:
410:
267:
However at a more advanced level the APIDS can learn, be taught or even reduce what is often an infinite protocol set, to an acceptable understanding of the
118:
125:
492:
107:
87:
of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to be
482:
456:
176:
158:
49:
132:
403:
84:
449:
80:
487:
96:
396:
287:
237:
198:
313:
214:
73:
226:
92:
293:
202:
88:
218:
217:
of the protocol and will typically consist of a system or agent that would typically sit between a
222:
264:
At a basic level an APIDS would look for, and enforce, the correct (legal) use of the protocol.
433:
380:
278:", thus should that application be subverted or changed, so will the fingerprint change.
338:
271:
of that application protocol that is used by the application being monitored/protected.
249:
476:
275:
368:
425:
245:
233:
376:
253:
274:
Thus, an APIDS, correctly configured, will allow an application to be "
229:
and analyzing the application protocol between two connected devices.
268:
201:
that focuses its monitoring and analysis on a specific application
79:
Please help to demonstrate the notability of the topic by citing
241:
56:
15:
437:
384:
108:"Application protocol-based intrusion detection system"
191:
application protocol-based intrusion detection system
339:"What is an Intrusion Detection System (IDS)? | IBM"
232:A typical place for an APIDS would be between a
213:An APIDS will monitor the dynamic behavior and
457:
404:
205:or protocols in use by the computing system.
8:
50:Learn how and when to remove these messages
464:
450:
411:
397:
177:Learn how and when to remove this message
159:Learn how and when to remove this message
314:"6 Types of Intrusion Detection System"
305:
7:
432:This security software article is a
422:
420:
365:
363:
436:. You can help Knowledge (XXG) by
383:. You can help Knowledge (XXG) by
375:This article related to a type of
14:
31:This article has multiple issues.
493:Computer security software stubs
424:
367:
318:internationalsecurityjournal.com
61:
20:
72:may not meet Knowledge (XXG)'s
39:or discuss these issues on the
294:Web application firewall (WAF)
1:
74:general notability guideline
483:Intrusion detection systems
260:Monitoring dynamic behavior
509:
419:
362:
288:Intrusion detection system
238:database management system
199:intrusion detection system
81:reliable secondary sources
70:The topic of this article
252:as it interacts with the
244:protocol specific to the
488:Software type stubs
76:
445:
444:
392:
391:
240:, monitoring the
187:
186:
179:
169:
168:
161:
143:
71:
54:
500:
466:
459:
452:
428:
421:
413:
406:
399:
371:
364:
354:
353:
351:
350:
335:
329:
328:
326:
325:
310:
182:
175:
164:
157:
153:
150:
144:
142:
101:
65:
64:
57:
46:
24:
23:
16:
508:
507:
503:
502:
501:
499:
498:
497:
473:
472:
471:
470:
418:
417:
360:
358:
357:
348:
346:
337:
336:
332:
323:
321:
312:
311:
307:
302:
284:
262:
211:
183:
172:
171:
170:
165:
154:
148:
145:
102:
100:
78:
66:
62:
25:
21:
12:
11:
5:
506:
504:
496:
495:
490:
485:
475:
474:
469:
468:
461:
454:
446:
443:
442:
429:
416:
415:
408:
401:
393:
390:
389:
372:
356:
355:
330:
304:
303:
301:
298:
297:
296:
291:
283:
280:
261:
258:
250:business logic
221:, or group of
210:
207:
185:
184:
167:
166:
69:
67:
60:
55:
29:
28:
26:
19:
13:
10:
9:
6:
4:
3:
2:
505:
494:
491:
489:
486:
484:
481:
480:
478:
467:
462:
460:
455:
453:
448:
447:
441:
439:
435:
430:
427:
423:
414:
409:
407:
402:
400:
395:
394:
388:
386:
382:
378:
373:
370:
366:
361:
344:
340:
334:
331:
319:
315:
309:
306:
299:
295:
292:
289:
286:
285:
281:
279:
277:
276:fingerprinted
272:
270:
265:
259:
257:
255:
251:
247:
243:
239:
235:
230:
228:
224:
220:
216:
208:
206:
204:
200:
196:
192:
181:
178:
163:
160:
152:
141:
138:
134:
131:
127:
124:
120:
117:
113:
110: –
109:
105:
104:Find sources:
98:
94:
90:
86:
82:
75:
68:
59:
58:
53:
51:
44:
43:
38:
37:
32:
27:
18:
17:
438:expanding it
431:
385:expanding it
374:
359:
347:. Retrieved
345:. 2023-04-19
342:
333:
322:. Retrieved
320:. 2024-04-01
317:
308:
273:
266:
263:
231:
212:
194:
190:
188:
173:
155:
146:
136:
129:
122:
115:
103:
47:
40:
34:
33:Please help
30:
343:www.ibm.com
85:independent
477:Categories
349:2024-07-09
324:2024-07-09
300:References
246:middleware
234:web server
227:monitoring
149:April 2012
119:newspapers
93:redirected
36:improve it
83:that are
42:talk page
377:software
282:See also
254:database
236:and the
209:Overview
203:protocol
197:) is an
223:servers
219:process
133:scholar
97:deleted
269:subset
135:
128:
121:
114:
106:
89:merged
379:is a
290:(IDS)
215:state
195:APIDS
140:JSTOR
126:books
95:, or
434:stub
381:stub
112:news
242:SQL
189:An
479::
341:.
316:.
256:.
225:,
91:,
45:.
465:e
458:t
451:v
440:.
412:e
405:t
398:v
387:.
352:.
327:.
248:/
193:(
180:)
174:(
162:)
156:(
151:)
147:(
137:·
130:·
123:·
116:·
99:.
77:.
52:)
48:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.