answersLogoWhite

0

When you are using active scanning you have to send certain signal through network. This kind of attack the easiest to find, but the fastest to get information about a remote computer.

When you are using passive scanning, you are collecting information which are going through network without sending any request to a remote computer. This sort of attack really hard to find, but it's possible using special kinds of network packets. It requires more time then for the active mode.

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

On which type of IDS would you use Passive Detection?

Both host-based and network-basedAnswer Explanation: Both network-based and host-based IDSs can provide active or passive detection. With active detection, the IDS responds to a detected threat with an action to stop the attack. For example, the IDS can attempt to terminate a suspicious connection or shut down the exploited services. Passive detection also involves an action by the IDS, but in this case, the IDS sends alerts to an administrator or records the suspicious event to a log.


16 Richard wants to modify his current network ids solution to allow his sensor to stop unwanted activity turning it into an ips Richard should replace his passive tap with an to?

Active Tap


What is the difference between an Intrusion Detection Utility and a antivirus activity?

IDS = Intrusion Detection system There are many forms of IDS (Network IDS) (Host IDS) Network IDS will Generally Capture all Traffic on the network Host will Capture Traffic for Individual Host IDS detects attempted attacks using Signatrue and Patterns much like an Anti Virus App will. Anti Virus - will Capture attempted Infections of Files or email, the general infection will be a Trojan and or Virus/Malware,cally change an ACL.


The difference between Pentium t4200 and Pentium t3400?

Sorry to be short but check it out here: http://ark.intel.com/Compare.aspx?ids=37251,35583, Basically the T4200 is newer architecture.


How did the imperial crisis lead non-elite colonists to become politically active?

It didn't, now you can get an A+ on your IDs for such a great Argument :D


What are the hours for category II facility with IDS the interval between security patrols is?

48 hours


What is IDS Scheer's population?

The population of IDS Scheer is 2,760.


When was IDS Scheer created?

IDS Scheer was created in 1984.


How tall is Ids Postma?

Ids Postma is 191 cm.


What is true of the IDS?

The purpose of the IDS is to accomplish deployment preparation tasks. The IDS creates a LOGMOD schedule for the deployment process The IDS enables documentation of the sequence of deployments and movement requirements.


How passive attack can be detected?

Passive attacks can be detected through monitoring network traffic for suspicious or unusual patterns, analyzing log files for unauthorized access attempts or unusual activities, and conducting regular security audits and assessments to identify vulnerabilities. Using intrusion detection systems (IDS) and security information and event management (SIEM) tools can also help in detecting passive attacks.


A Hybrid IDS is a combination of which types of IDS?

HIDS and NIDS