30
ADP
This chapter introduces ADP (Anomaly Detection and Prevention), anomaly profiles and binding an ADP profile to a traffic direction. See Section 5.4.16 on page 120 for related information on these screens.
30.1 Introduction to ADP
An ADP system can detect malicious or suspicious packets and respond instantaneously. It can detect:
•Anomalies based on violations of protocol standards (RFCs – Requests for Comments)
•Abnormal flows such as port scans.
30.1.1Host Intrusions
The goal of
You must install a host ADP directly on the system being protected. It works closely with the operating system, monitoring and intercepting system calls to the kernel or APIs in order to prevent attacks as well as log them.
Disadvantages of host ADPs are that you have to install them on each device (that you want to protect) in your network and due to the necessarily tight integration with the host operating system, future operating system upgrades could cause problems.
30.1.2 Network Intrusions
| 445 |
ZyWALL USG 300 User’s Guide | |
|
|