Technology Limitations: NBA technologies offer strong
detection capabilities for certain types of threats, but they also
have significant limitations. An important limitation is the delay
in detecting attacks. Some delay is inherent in anomaly
detection methods that are based on deviations from a baseline,
such as increased bandwidth usage or additional connection
attempts. However, NBA technologies often have additional
delay caused by their data sources, especially when they rely on
flow data from routers and other network devices. This data is
often transferred to the NBA system in batches; depending on
the product’s capabilities, network capacity, and administrator
preferences, this could occur relatively frequently (e.g., every
minute, every two minutes) or relatively infrequently (e.g.,
every 15 minutes, every 30 minutes). Because of this delay,
attacks that occur quickly, such as malware infestations and
DoS attacks may not be detected until they have already
disrupted or damaged systems.
Technology Limitations: NBA technologies offer strongdetection capabilities for certain types of threats, but they alsohave significant limitations. An important limitation is the delayin detecting attacks. Some delay is inherent in anomalydetection methods that are based on deviations from a baseline,such as increased bandwidth usage or additional connectionattempts. However, NBA technologies often have additionaldelay caused by their data sources, especially when they rely onflow data from routers and other network devices. This data isoften transferred to the NBA system in batches; depending onthe product’s capabilities, network capacity, and administratorpreferences, this could occur relatively frequently (e.g., everyminute, every two minutes) or relatively infrequently (e.g.,every 15 minutes, every 30 minutes). Because of this delay,attacks that occur quickly, such as malware infestations andDoS attacks may not be detected until they have alreadydisrupted or damaged systems.
การแปล กรุณารอสักครู่..
