- 积分
- 147
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
发表于 2016-6-2 16:39:13
|
显示全部楼层
第七十题
8 }6 y1 i/ l& A5 m' ~有些疑问
8 ?+ e+ X. j. {" N1 M _! P. l L9 J9 D) P% u" I; V; V
1. Add the anomaly detection policy to your virtual sensors.
' e$ X2 }9 c2 E' i, P$ V% }You can use the default anomaly detection policy, ad0, or you can configure a new one.
" k7 S" _! @& n% S2. Configure the anomaly detection zones and protocols.$ }6 |: m2 a" ?+ I0 v5 \. ^% T
3. By default, the anomaly detection operational mode is set to Detect, although for the first 24 hours
! l1 @1 R: ]+ |! x Z; X- i, P/ b, Z9 Eit performs learning to create a populated KB. The initial KB is empty and during the default 24) Z* O8 L, B/ i
hours, anomaly detection collects data to use to populate the KB. If you want the learning period to* Q" `* p1 U/ V# a; |
be longer than the default period of 24 hours, you must manually set the mode to Learning Accept.
/ a4 k5 M4 @; L8 D# s4. Let the sensor run in learning accept mode for at least 24 hours (the default).
) @ x3 ]( e `3 r0 `0 R7 N1 WYou should let the sensor run in learning accept mode for at least 24 hours so it can gather/ r7 b R# Z9 s# k: s& K
information on the normal state of the network for the initial KB. However, you should change the6 b1 ?: Q9 N0 _& t) h
amount of time for learning accept mode according to the complexity of your network.
9 I, c# U& X# P4 R3 _5. If you manually set anomaly detection to learning accept mode, switch back to detect mode./ v5 j1 }1 S& h
6. Configure the anomaly detection parameters:5 Z) A* ~' K; D) x# S/ N8 s
• Configure the worm timeout and which source and destination IP addresses should be bypassed
! M* E0 d4 T" K: [/ j$ kby anomaly detection.
2 L+ t! s5 L' |/ qAfter this timeout, the scanner threshold returns to the configured value., O5 M/ t) ]& a5 { n
• Decide whether you want to enable automatic KB updates when anomaly detection is in detect
4 P( J- A% B1 k& \" d/ a. w+ Amode.
( c- F7 [* J. J/ K: }. B( k! {( O• Configure the 18 anomaly detection worm signatures to have more event actions than just the
4 S# c" k$ I. |% l9 q6 r( sdefault Produce Alert. For example, configure them to have Deny Attacker event actions.
7 P! v1 p) ^1 E/ U& | |
-
5#
2016-6-2 16:39:13
回复(0)
收起回复
|