312-49v10 Exam QuestionsBrowse all questions from this exam

312-49v10 Exam - Question 36


Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

Show Answer
Correct Answer: BC

Anomaly detection systems typically produce the most false alarms because they identify deviations from established normal behavior. User and network behaviors can be highly varied and unpredictable, leading the system to flag legitimate actions as anomalies, thus generating a higher number of false positives.

Discussion

8 comments
Sign in to comment
claudiatang9Option: C
Oct 12, 2022

Might be C. CHFI textbook p651: the conventional method of anomaly detection, essential data are kept for checking variations in network traffic. However, in reality, some unpredictability exists in network traffic, and there are too many statistical variations, making these models imprecise. Some events labeled as anomalies might only be irregularities in network usage.

K3nz0420Option: A
Feb 27, 2022

Network based IDS should be the correct answer

BarryMacockenerOption: C
Nov 1, 2022

I feel like the answer has to be either B or C as the question specifically refers to the "unpredictable behavior" of users. It's definitely NOT D, as a signature-based IDS is not behavior-based as it looks for predefined characteristics. It's pretty well-known in infosec that a signature-based IDS does not produce as many false positives as an anomaly-based IDS. I personally believe the answer is C.

Port_StackOption: C
Dec 4, 2022

The question itself mentions users and networks, hence it cannot be HIDS as that is limited to Host. It narrows it down to NIDS or Anomaly Detection. The details for Anomaly Detection is found in EC Coucil's Network Defender Course e-Book where it states the following disadvantages for Anomaly Detection. "Disadvantages ▪ The rate of generating false alarms is high due to unpredictable behavior of users and networks ▪ The need to create an extensive set of system events in order to characterize normal behavior patterns" The answer should be Anomaly Detection.

vcloudpmpOption: D
Mar 8, 2022

Might be D. From EC Council official materials: " Signature recognition can detect known attacks. However, there is a possibility that some innocuous packets might also contain the same signature, triggering false positives. o Improper signatures may trigger false positives. To detect misuse, a huge number of signatures is required. The more the signatures, the greater are the chances of the IDS detecting attacks. However, normal traffic may incorrectly match with the signatures, impeding system performance.

Toni222Option: C
Jul 12, 2024

Anomaly detection systems typically produce the most false alarms because they are designed to identify deviations from normal behavior. Since user and network behaviors can be unpredictable and varied, these systems may incorrectly flag legitimate activities as suspicious, leading to a higher number of false positives.

ElbOption: B
Jul 22, 2023

I think B is the correct answer. Question ask for the IDS systems ( hids/nids) not for the IDS detection approach ( Anomaly/Signature)

Elb
Jul 22, 2023

A not B. :) NIDS is quicker but turn up more false positives than an HIDS.

ElbOption: A
Jun 14, 2024

NIDS systems turn up more false positives than HIDS.