Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Security and forensic computing: intrusion detection systems.
Buchanan, William J
Authors
Abstract
2 INTRUSION DETECTION SYSTEMS 50
2.1 Introduction 50
2.2 Types of intrusion 53
2.3 Attack patterns 54
2.4 Host/network-based intrusion detection 55
2.5 Placement of the IDS 57
2.6 SNORT 59
2.7 Example rules 61
2.8 Running Snort 67
2.9 User, machine and network profiling 73
2.10 Honey pots 74
2.11 In-line and out-of-line IDSs 76
2.12 False and true 77
2.13 Customized Agent-based IDS 78
2.14 Tutorial 79
2.15 Software tutorial 81
Citation
Buchanan, W. J. (2010). Security and forensic computing: intrusion detection systems
Publication Date | 2010 |
---|---|
Deposit Date | Jan 11, 2011 |
Publicly Available Date | Jan 11, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Intrusion detection systems; data security; honeypots; agent-based; networks; hosts; user identification; authentication; hackers; viruses; worms; Trojan; firewall; gateway; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4058 |
Contract Date | Jan 11, 2011 |
Files
unit03_ids.pdf
(7.9 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
sfc_unit02.html
(505 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search