Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
2 INTRUSION DETECTION SYSTEMS 50
2.1 Introduction 50
2.2 Types of intrusion 53
2.3 Attack patterns 54
2.4 Host/network-based intrusion detection 55
2.5 Placement of the IDS 57
2.6 SNORT 59
2.7 Example rules 61
2.8 Running Snort 67
2.9 User, machine and network profiling 73
2.10 Honey pots 74
2.11 In-line and out-of-line IDSs 76
2.12 False and true 77
2.13 Customized Agent-based IDS 78
2.14 Tutorial 79
2.15 Software tutorial 81
Buchanan, W. J. (2010). Security and forensic computing: intrusion detection systems
Publication Date | 2010 |
---|---|
Deposit Date | Jan 11, 2011 |
Publicly Available Date | Jan 11, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Intrusion detection systems; data security; honeypots; agent-based; networks; hosts; user identification; authentication; hackers; viruses; worms; Trojan; firewall; gateway; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4058 |
Contract Date | Jan 11, 2011 |
unit03_ids.pdf
(7.9 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
sfc_unit02.html
(505 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode
(2024)
Presentation / Conference Contribution
Detection of Ransomware
(2024)
Patent
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search