Network
1) HIDS vs NIDS
HIDS is host intrusion detection system - placed on each host
NIDS is network intrusion detection system - placed in the network
Both the systems work on the similar lines. It’s just that the placement in different.
For an enterprise, NIDS is preferred as HIDS is difficult to manage, plus it consumes processing power of the host as well.2) How does tracert/traceroute work? What protocol does it use?
In case you can’t ping the final destination, tracert will help to identify where the connection stops or gets broken, whether it is
firewall, ISP, router etc.
It actually keeps sending packets to the final destination; the only change is the TTL that’s used. The extra credit is the fact that
Windows uses ICMP by default while Linux uses UDP
The Time To Live (TTL) field in an IP header was intended to hold the number of seconds for which the IP packet is valid, after which
it can be dropped. In practice, it is used as a decrementing hop count, whereby every router that forwards the packet reduces the TTL
value by one.
IP Packet Headers: Source, Destination, TimetoLive (TTL)
When TTL=0, router sends a message says "I dropped the packets"Last updated