Content deleted Content added
Tag: repeating characters |
m Reverting possible vandalism by 75.145.95.81 to version by 87.244.196.82. False positive? Report it. Thanks, ClueBot. (708894) (Bot) |
||
Line 5:
A typical place for an APIDS would be between a [[web server]] and the [[database management system]], monitoring the [[SQL]] protocol specific to the [[middleware]]/[[business logic]] as it interacts with the [[database]].
== Monitoring dynamic behavior ==
Line 13 ⟶ 12:
Thus, an APIDS, correctly configured, will allow an application to be "[[fingerprint]]ed", thus should that application be subverted or changed, so will the fingerprint change.
==See also==
Line 24 ⟶ 22:
[[ko:호스트 기반 침입 탐지 시스템]]
[[it:Application Protocol intrusion detection system]]
|