1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veronika [31]
3 years ago
6

3. Describe what a pre-processor does in a network-based IDS tool such as Snort. Demonstrate your understanding of this function

ality by citing two examples of pre-processors and explaining what they contribute to the process of network traffic analysis and intrusion detection.
Computers and Technology
1 answer:
MrRissso [65]3 years ago
8 0

Answer:

Pre-processors look at organize traffic and screens parcel transmissions by examining andreassembling divided data.Frag2:preprocessor that battles against IP fracture attacks.Attackers sends a fragmentedTCP bundle with header data that gets entrance through a firewall.At the equivalent time,other parcels with vindictive information "slip" by the firewall undetected because of the fragmentationbeing so little by overwriting the header information.The frag2 pre-processor is specificallydesigned to break down bundle discontinuity to search out noxious information in the sections, which iswhy this pre-processor ought to never be turned off.Stream4:preprocessor Snort uses to coordinate assault marks over numerous packets.Anattacker endeavors to send different parcels into the system conveying parts of the attackpayload which are required to be reassembled by the host so as to start an attack.Stream4 stores the bits of the mark until all bundles are transmitted.Once they are alltransmitted, Stream4 finishes the signature and an alarm is created.

Explanation:

You might be interested in
Approximately, what percentage of Smartphone owners in America uses their mobile devices to access social media platforms?
Dmitry_Shevchenko [17]
Yes you are correct it is 40%
5 0
3 years ago
You '' friend or ''like'' a page o your favorite social media page that advertises a
Naddik [55]

Answer:

The correct answer for the given question is " yes".

Explanation:

In the above question the correct answer is yes because, in any social media site. If we like any web page.it will shows the name of person that like the web  pages .

For example: if we login in any social side  we will see various images,video and story etc.if any  user like all.  it will show the person name that is liked by them.

So the correct answer for this question is yes.

5 0
3 years ago
Tgif
VMariaS [17]
Science and mathematics. STEM can also be engineering but in John’s case, he’s a METEOROLOGIST WHO DOES THE WEATHER FORECAST and meteorologists is part of a study in science and also mathematics because of measuring the speed of some related computations
6 0
3 years ago
Define the term loop rule.
Triss [41]

Answer:

voltage differences

Explanation:

5 0
3 years ago
A programmer wants to determine whether a score is within 10 points of a given target. For example, if the target is 50, then th
Kipish [7]

Answer:

(target - 10 ≤ score) AND (score ≤ target + 10)

Explanation:

8 0
3 years ago
Other questions:
  • A motherboard uses dual channeling, but you have four DIMMs available that differ in size. The motherboard supports all four siz
    7·1 answer
  • WHICH OF THE FOLLOWING LOOKS JUST LIKE A CD ROM BUT CAN STORE MUCH MORE INFORMATION
    8·2 answers
  • HELP PLEASE
    5·1 answer
  • Consider this data sequence: "fish bird reptile reptile bird bird bird mammal fish". let's define a singleton to be a data eleme
    5·1 answer
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • If you are logged on to Windows Live Messenger, why would you be unable to engage
    6·1 answer
  • Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
    11·1 answer
  • Karl comes across confidential information. What should he do with it? A. Manipulate the information in his favor B. Sell the in
    12·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • If anyone knows how to code on python:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!