Packer argues that, in general IDRS subsystem consists of 3 terraced, [12], namely: detection (detection technology layer), manager (data analysis and configuration management layer), and the interface (layer or user console graphical user interface).
In the detection subsystem technology implemented sensors or engines or probes the system software or technology-based applications that oversees the network traffic is dense and high speed. Sensor device is processor-intensive on a PC that works for all network traffic analysis and will send a special signal to the subsystem manager that functions as a central management server when the detected intrusion.
Subsystem data analysis and configuration management, which works as a manager, to receive input from the sensors to be saved, analyzed, and detected possible intrusion. Managers are usually placed in a data center or server room with protektor physical device such as a back-up automatic fire detectors, and uninterruptible power supply (UPS). Manager must provide configuration IDRS and all the technical instructions / procedures the security system.
Subsystem console form graphical user interface (GUI) is installed on a PC, especially for the work and report the se-se-intuitive and flexible, each may have abnormal occurrence.
Food Packer has been evidenced by Balasubramanian et al, [1], which build IDRS with the core subsystem consists of: the agent and record every incident in an abnormal host, the transceiver functions have to control and data processing agent in a host, and monitor that control the many entities in several different host. IDRS Balasubramanian with agent-based hierarchical architecture, where the monitor as the root.
It is expected that the characteristics
IDRS is expected to have ideal characteristics, [2]:
a) Can the appropriate configuration policies that are applied.
b) On without stopping and without much human intervention.
c) Has the fault tolerance and crash due to status last able to recover before continuing the process.
d) immune subversion with its own intrusion detection capabilities.
e) the system overhead as possible.
f) Can adapt to any changes in technology and environment activities.
g) the system can be small or large scale with the results of accurate and timely.
h) Ability to maintain system performance, although some components stop working (gracefull degradation of service).
i) Allows dynamic reconfiguration when the change occurred because of the observation system in a large scale.
I need your support in wisata seo sadau for my best friend he is Manusia Biasa. thanks alot broooooowwwww.......
0 komentar:
Post a Comment