Skip to main content

Research Repository

Advanced Search

Security and forensic computing: intrusion detection systems.

Buchanan, William J

Authors



Abstract

2 INTRUSION DETECTION SYSTEMS 50
2.1 Introduction 50
2.2 Types of intrusion 53
2.3 Attack patterns 54
2.4 Host/network-based intrusion detection 55
2.5 Placement of the IDS 57
2.6 SNORT 59
2.7 Example rules 61
2.8 Running Snort 67
2.9 User, machine and network profiling 73
2.10 Honey pots 74
2.11 In-line and out-of-line IDSs 76
2.12 False and true 77
2.13 Customized Agent-based IDS 78
2.14 Tutorial 79
2.15 Software tutorial 81

Publication Date 2010
Deposit Date Jan 11, 2011
Publicly Available Date Jan 11, 2011
Peer Reviewed Not Peer Reviewed
Keywords Intrusion detection systems; data security; honeypots; agent-based; networks; hosts; user identification; authentication; hackers; viruses; worms; Trojan; firewall; gateway;
Public URL http://researchrepository.napier.ac.uk/id/eprint/4058
Contract Date Jan 11, 2011

Files






You might also like



Downloadable Citations