Research Output
Security and forensic computing: intrusion detection systems.
  2 INTRUSION DETECTION SYSTEMS 50
2.1 Introduction 50
2.2 Types of intrusion 53
2.3 Attack patterns 54
2.4 Host/network-based intrusion detection 55
2.5 Placement of the IDS 57
2.6 SNORT 59
2.7 Example rules 61
2.8 Running Snort 67
2.9 User, machine and network profiling 73
2.10 Honey pots 74
2.11 In-line and out-of-line IDSs 76
2.12 False and true 77
2.13 Customized Agent-based IDS 78
2.14 Tutorial 79
2.15 Software tutorial 81

  • Date:

    30 November 2009

  • Publication Status:

    Published

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Buchanan, W. J. (2009). Security and forensic computing: intrusion detection systems

Authors

Keywords

Intrusion detection systems; data security; honeypots; agent-based; networks; hosts; user identification; authentication; hackers; viruses; worms; Trojan; firewall; gateway;

Monthly Views:

Available Documents