- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 288字
- 2021-07-02 23:30:52
False positives

As it is related to detection for an analyzed event, there are four situations that exist in this context, corresponding to the relationship between the results of the detection for an analyzed event. In this case, each of the corresponding situations is outlined as follows:
- True positive (TP): This is when the analyzed event is correctly classified as an intrusion or as harmful/malicious.
For example, a network security administrator enters their credentials into the Active Directory server and is granted administrator access. - True negative (TN): This is when the analyzed event is correctly classified and correctly rejected.
For example, an attacker uses a port such as 4444 to communicate with a victim's device. An intrusion detection system detects network traffic on the authorized port and alerts the cyber security team to this potential malicious activity. The cyber security team quickly closes the port and isolates the infected device from the network. - False positive (FP): This is when the analyzed event is innocuous or otherwise clean in the context of security, however, the system classifies it as malicious or harmful.
For example, a user types their password into a website's login text field. Instead of being granted access, the user is flagged for an SQL injection attempt by input sanitation. This is often caused when input sanitation is misconfigured. - False negative (FN): This is when the analyzed event is malicious, but it is classified as normal/innocuous.
For example, an attacker inputs an SQL injection string into a text field found on a website to gain unauthorized access to database information. The website accepts the SQL injection as normal user behavior and grants access to the attacker. For detection, having systems correctly identify the given situation is paramount.
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- Android應(yīng)用安全實戰(zhàn):Frida協(xié)議分析
- 數(shù)據(jù)恢復方法及案例分析
- SASE原理、架構(gòu)與實踐
- 工業(yè)互聯(lián)網(wǎng)安全防護與展望
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- 走進新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 黑客攻防與無線安全從新手到高手(超值版)
- 云原生安全技術(shù)實踐指南
- 數(shù)據(jù)安全架構(gòu)設(shè)計與實戰(zhàn)
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實施指南
- 網(wǎng)絡(luò)空間安全導論
- 功能型密碼算法設(shè)計與分析
- 云計算安全技術(shù)與應(yīng)用
- 安全網(wǎng)絡(luò)構(gòu)建