Limitations
- Noise can severely limit an Intrusion detection system's effectiveness. Bad packets generated from software bugs, corrupt DNS data, and local packets that escaped can create a significantly high false-alarm rate.
- It is not uncommon for the number of real attacks to be far below the false-alarm rate. Real attacks are often so far below the false-alarm rate that they are often missed and ignored.
- Many attacks are geared for specific versions of software that are usually outdated. A constantly changing library of signatures is needed to mitigate threats. Outdated signature databases can leave the IDS vulnerable to new strategies.
Read more about this topic: Intrusion Detection System
Famous quotes containing the word limitations:
“That all may be so, but when I begin to exercise that power I am not conscious of the power, but only of the limitations imposed on me.”
—William Howard Taft (18571930)
“To note an artists limitations is but to define his talent. A reporter can write equally well about everything that is presented to his view, but a creative writer can do his best only with what lies within the range and character of his deepest sympathies.”
—Willa Cather (18761947)
“The limitations of pleasure cannot be overcome by more pleasure.”
—Mason Cooley (b. 1927)
Related Subjects
Related Phrases
Related Words