Це відео не доступне.
Перепрошуємо.
IDS Detection Methods /Techniques : Signature Based IDS and Anomaly Based IDS in Hindi
Вставка
- Опубліковано 9 тра 2019
- Myself Shridhar Mankar a Engineer l UA-camr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengineering.com
5 Minutes Engineering English UA-cam Channel - / @5minutesengineeringen...
Instagram - 5minuteseng...
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...
Thankyou so much from the land of mountains,Nepal. I owe u my understanding in IDS and AES.
Don't say thank you to watch, Thank your we should say to create these videos........
Such a clear lecture it was 👌🏻
Awesome explaination sir thank you for explaination........
Thank you sir for your support for students ☺️
Great 👍. Thanks alot the topic remained in mind.
Easy to understand, great video
Perfect...Can not find this type of video on Internet.
Thank you sir for this amazing video
Awesome vedio sir thanks for it ☺.........♥
Amazing explanation Thank Your 😊✨
Great explanation sir
Very helpful video sir
Very good explanation sir
You are the best 💯
Thankyou for the video sir
Outstanding..
thnku sir , please upload videos for STQA subject
One of my favorite teacher lot of love from pakistan sir ❤️❤️
yar bhai app great hou thank you
chumma explanation 🥰
Good video.
Sir upload more videos of Ics if possible . 6Th unit videos are not yet uploaded
Thank you
Thankyou so much for Css 🔥. Please more videos on them !!!!!!!!
Sir can you make a video on DSPA. (2012 part) digital signal processing application...4 & 5 unit sir...plsss
Thank you so much sir
Kamal Ka lecture Vai
JAZAK ALLAH SIR
Sir appp bohat acha padhte h
Amazing explanation 💯
U too
Sir please create videos for M.Tech as well.
But the changes are done by administrative permissions on Administrative System then how it can detect deviation.
All know administrator have permission to change the Developer Rights.
Then how we can say that Deviation occurred here plz help...
Thank you
Yes.....same dought 😮
Here deviation is in the change of behaviour of developer .So that change in behaviour is detected by ids
It was just an example, The real scenario would be, Lets say there is a Application( running with admin privileges) which used for taking screenshot only and lets say hacker hacks that application and uses it for another purpose (deleting files/modifying system files/scanning network/dropping malware) so that is called Anomaly/deviation because that is not the actual use of application.
For example if someone is widthrwing 100$ from ATM on monthly basis .... And some hacker hack his credit card and widthraw 1000$ .. then system will generate an devation and alert the user that someone is attempting for widtheral of 1000$ from ur account.... And system will ask permission from user for widthrawal of money....
@@azanalikhan8708 This example is helpful
I was curious to get knowledge of these things... found randomly...tq for providing
Bro can't you upload more videos of DAA
Good sir
Teardrop attacks and counter measures ka video upload kijie please
Sir ids ke limitations ka video ap upload nhi kie h kya
Sir ap kill chain modal pr bhi ek video banao
Dynamic linking k full chapter pe b kindly sir video bna de exam kareeb h
Good
You just look like a hit man Rohit Sharma
when the developer made some changes from the system administrator logged in system, then how it can be detected?
ABC Company is worried about the misuses of the database components. Company’s manager is asking you to recommend an intrusion detection system to help identify misuses. Would you use anomaly-based or misuse-based intrusion detection? Justify your answer
"barabar"? Hanji sir ji ekdam barabar smjgye ye topic clg wale bhi na smja paye😁👍
signature based IDS are also called pre-emptive blocking???
Sir please upload the videos of Machine Learning subject ... it's too difficult to study the same....20 th may their is paper of Machine learning...so please make vedio on that.. please
What is the normal function of developer
1:10 malicious code ko add karne ka tarika thora casual hai
Examples of signature based ids
❤️
❤️ ❤️❤️❤️❤️❤️❤️❤️
Sir, can I take class from you? Could you please provide your contact ?
developer ki satak gyi aur wo admin ke offfice me ghus gya😂😂😂😂😂
Love from pakistan.
Bhai vote deke aaya tha 😂