Це відео не доступне.
Перепрошуємо.

IDS Detection Methods /Techniques : Signature Based IDS and Anomaly Based IDS in Hindi

Поділитися
Вставка
  • Опубліковано 9 тра 2019
  • Myself Shridhar Mankar a Engineer l UA-camr l Educational Blogger l Educator l Podcaster.
    My Aim- To Make Engineering Students Life EASY.
    Website - 5minutesengineering.com
    5 Minutes Engineering English UA-cam Channel - / @5minutesengineeringen...
    Instagram - 5minuteseng...
    A small donation would mean the world to me and will help me to make AWESOME videos for you.
    • UPI ID : 5minutesengineering@apl
    Playlists :
    • 5 Minutes Engineering Podcast :
    • 5 Minutes Engineering ...
    • Aptitude :
    • Aptitude
    • Machine Learning :
    • Machine Learning
    • Computer Graphics :
    • Computer Graphics
    • C Language Tutorial for Beginners :
    • C Language Tutorial fo...
    • R Tutorial for Beginners :
    • R Tutorial for Beginners
    • Python Tutorial for Beginners :
    • Python Tutorial For Be...
    • Embedded and Real Time Operating Systems (ERTOS) :
    • Embedded and Real Time...
    • Shridhar Live Talks :
    • Shridhar Live Talks
    • Welcome to 5 Minutes Engineering :
    • Welcome To 5 Minutes E...
    • Human Computer Interaction (HCI) :
    • Human Computer Interac...
    • Computer Organization and Architecture :
    • Computer Organization ...
    • Deep Learning :
    • Deep Learning
    • Genetic Algorithm :
    • Genetic Algorithm
    • Cloud Computing :
    • Cloud Computing
    • Information and Cyber Security :
    • Information And Cyber ...
    • Soft Computing and Optimization Algorithms :
    • Soft Computing And Opt...
    • Compiler Design :
    • Compiler Design
    • Operating System :
    • Operating System
    • Hadoop :
    • Hadoop
    • CUDA :
    • CUDA
    • Discrete Mathematics :
    • Discrete Mathematics
    • Theory of Computation (TOC) :
    • Theory Of Computation ...
    • Data Analytics :
    • Data Analytics
    • Software Modeling and Design :
    • Software Modeling And ...
    • Internet Of Things (IOT) :
    • Internet Of Things (IOT)
    • Database Management Systems (DBMS) :
    • Database Management Sy...
    • Computer Network (CN) :
    • Computer Networks (CN)
    • Software Engineering and Project Management :
    • Software Engineering A...
    • Design and Analysis of Algorithm :
    • Design And Analysis Of...
    • Data Mining and Warehouse :
    • Data Mining and Warehouse
    • Mobile Communication :
    • Mobile Communication
    • High Performance Computing :
    • High Performance Compu...
    • Artificial Intelligence and Robotics :
    • Artificial intelligenc...

КОМЕНТАРІ • 62

  • @subashadhikari3290
    @subashadhikari3290 2 роки тому +8

    Thankyou so much from the land of mountains,Nepal. I owe u my understanding in IDS and AES.

  • @lkls987
    @lkls987 Рік тому +8

    Don't say thank you to watch, Thank your we should say to create these videos........

  • @zubiyaali2798
    @zubiyaali2798 2 роки тому +3

    Such a clear lecture it was 👌🏻

  • @vaibhavlad2932
    @vaibhavlad2932 4 роки тому +1

    Awesome explaination sir thank you for explaination........

  • @AbhishekMishra-cm3kp
    @AbhishekMishra-cm3kp 2 роки тому

    Thank you sir for your support for students ☺️

  • @oemdraprabhu1545
    @oemdraprabhu1545 2 роки тому

    Great 👍. Thanks alot the topic remained in mind.

  • @Amina-1801
    @Amina-1801 4 роки тому

    Easy to understand, great video

  • @chatrughanprasad7778
    @chatrughanprasad7778 4 роки тому

    Perfect...Can not find this type of video on Internet.

  • @prernarane674
    @prernarane674 4 роки тому +1

    Thank you sir for this amazing video

  • @chhayadubey7300
    @chhayadubey7300 3 роки тому +1

    Awesome vedio sir thanks for it ☺.........♥

  • @dakhaniusman9644
    @dakhaniusman9644 8 місяців тому

    Amazing explanation Thank Your 😊✨

  • @Viju12
    @Viju12 3 місяці тому

    Great explanation sir

  • @ambreenfatima5593
    @ambreenfatima5593 4 роки тому

    Very helpful video sir

  • @peremalabalamma6802
    @peremalabalamma6802 2 роки тому

    Very good explanation sir

  • @bhavya2301
    @bhavya2301 3 роки тому

    You are the best 💯

  • @ganesh9446
    @ganesh9446 4 роки тому

    Thankyou for the video sir

  • @69owi
    @69owi 4 роки тому

    Outstanding..

  • @ankitakotgire2131
    @ankitakotgire2131 5 років тому +1

    thnku sir , please upload videos for STQA subject

  • @AbdulWahab-cp9ib
    @AbdulWahab-cp9ib Рік тому +1

    One of my favorite teacher lot of love from pakistan sir ❤️❤️

  • @muzzammilsheikh194
    @muzzammilsheikh194 5 років тому +1

    yar bhai app great hou thank you

  • @mohitv3951
    @mohitv3951 2 місяці тому

    chumma explanation 🥰

  • @kumardigvijaymishra5945
    @kumardigvijaymishra5945 4 роки тому

    Good video.

  • @dipikajagtap8327
    @dipikajagtap8327 5 років тому +2

    Sir upload more videos of Ics if possible . 6Th unit videos are not yet uploaded

  • @shrutimate8155
    @shrutimate8155 5 років тому

    Thank you

  • @gomes8335
    @gomes8335 5 років тому +5

    Thankyou so much for Css 🔥. Please more videos on them !!!!!!!!

  • @kiranlonkar1362
    @kiranlonkar1362 5 років тому +3

    Sir can you make a video on DSPA. (2012 part) digital signal processing application...4 & 5 unit sir...plsss

  • @navdeepbhanderi
    @navdeepbhanderi Рік тому

    Thank you so much sir

  • @mastermaster360
    @mastermaster360 3 роки тому

    Kamal Ka lecture Vai

  • @saweranadeem2040
    @saweranadeem2040 2 роки тому +1

    JAZAK ALLAH SIR

  • @ayushiarkhel3213
    @ayushiarkhel3213 4 роки тому

    Sir appp bohat acha padhte h

  • @NehaSingh-yf3gw
    @NehaSingh-yf3gw 4 роки тому +3

    Amazing explanation 💯

  • @Khushabu
    @Khushabu 2 роки тому

    Sir please create videos for M.Tech as well.

  • @Sundaramsatyam12
    @Sundaramsatyam12 5 років тому +11

    But the changes are done by administrative permissions on Administrative System then how it can detect deviation.
    All know administrator have permission to change the Developer Rights.
    Then how we can say that Deviation occurred here plz help...
    Thank you

    • @kovagapulaxminarayana6194
      @kovagapulaxminarayana6194 5 років тому

      Yes.....same dought 😮

    • @shikharmishra9258
      @shikharmishra9258 4 роки тому

      Here deviation is in the change of behaviour of developer .So that change in behaviour is detected by ids

    • @9thplayer
      @9thplayer 4 роки тому +3

      It was just an example, The real scenario would be, Lets say there is a Application( running with admin privileges) which used for taking screenshot only and lets say hacker hacks that application and uses it for another purpose (deleting files/modifying system files/scanning network/dropping malware) so that is called Anomaly/deviation because that is not the actual use of application.

    • @azanalikhan8708
      @azanalikhan8708 3 роки тому +2

      For example if someone is widthrwing 100$ from ATM on monthly basis .... And some hacker hack his credit card and widthraw 1000$ .. then system will generate an devation and alert the user that someone is attempting for widtheral of 1000$ from ur account.... And system will ask permission from user for widthrawal of money....

    • @muhammadfahadlatif1381
      @muhammadfahadlatif1381 3 роки тому

      @@azanalikhan8708 This example is helpful

  • @aashaktichaturvedi730
    @aashaktichaturvedi730 3 роки тому

    I was curious to get knowledge of these things... found randomly...tq for providing

  • @shaikhtayyaba19
    @shaikhtayyaba19 5 років тому +2

    Bro can't you upload more videos of DAA

  • @Shaileshentertainment66
    @Shaileshentertainment66 3 роки тому

    Good sir

  • @armanokealfaz4148
    @armanokealfaz4148 4 роки тому

    Teardrop attacks and counter measures ka video upload kijie please

  • @armanokealfaz4148
    @armanokealfaz4148 4 роки тому

    Sir ids ke limitations ka video ap upload nhi kie h kya

  • @ravi-op2pp
    @ravi-op2pp 3 роки тому

    Sir ap kill chain modal pr bhi ek video banao

  • @sehrishsehzadi253
    @sehrishsehzadi253 3 роки тому +1

    Dynamic linking k full chapter pe b kindly sir video bna de exam kareeb h

  • @aakarshraghuvanshi2577
    @aakarshraghuvanshi2577 3 роки тому

    Good

  • @Fit_medico_brishnikant
    @Fit_medico_brishnikant 3 роки тому +1

    You just look like a hit man Rohit Sharma

  • @Sabyasachi_Ipsita
    @Sabyasachi_Ipsita 2 роки тому

    when the developer made some changes from the system administrator logged in system, then how it can be detected?

  • @student9297
    @student9297 3 роки тому +1

    ABC Company is worried about the misuses of the database components. Company’s manager is asking you to recommend an intrusion detection system to help identify misuses. Would you use anomaly-based or misuse-based intrusion detection? Justify your answer

  • @amazinggamer9898
    @amazinggamer9898 8 місяців тому

    "barabar"? Hanji sir ji ekdam barabar smjgye ye topic clg wale bhi na smja paye😁👍

  • @NoobieTechsTithi_mukherjee
    @NoobieTechsTithi_mukherjee 4 роки тому

    signature based IDS are also called pre-emptive blocking???

  • @shreyaldevadhe8647
    @shreyaldevadhe8647 5 років тому +4

    Sir please upload the videos of Machine Learning subject ... it's too difficult to study the same....20 th may their is paper of Machine learning...so please make vedio on that.. please

  • @kavyalakshmanan1828
    @kavyalakshmanan1828 2 роки тому

    What is the normal function of developer

  • @jhonnysir4142
    @jhonnysir4142 7 місяців тому

    1:10 malicious code ko add karne ka tarika thora casual hai

  • @mohsinmaqbool182
    @mohsinmaqbool182 Рік тому

    Examples of signature based ids

  • @SHIVAMGUPTA-fp2uc
    @SHIVAMGUPTA-fp2uc 2 роки тому

    ❤️

  • @Shaikshaheed427
    @Shaikshaheed427 5 років тому

    ❤️ ❤️❤️❤️❤️❤️❤️❤️

  • @indrakumari1854
    @indrakumari1854 2 роки тому

    Sir, can I take class from you? Could you please provide your contact ?

  • @anshsachdeva1061
    @anshsachdeva1061 4 роки тому +1

    developer ki satak gyi aur wo admin ke offfice me ghus gya😂😂😂😂😂

  • @ajb1442
    @ajb1442 5 років тому +2

    Love from pakistan.

  • @thronegamer
    @thronegamer 3 місяці тому

    Bhai vote deke aaya tha 😂