In Partnership with AOL

See also:
  • IDS Evasion Techniques (Security Focus) - Explanations of basic IDS evasion techniques as well as suggested fixes and countermeasures to such attacks. Topics covered include basic string-matching weaknesses, polymorphic shell code, session splicing, fragmentation attacks, and denial of service attacks.
    [!]
  • An Introduction to Intrusion Detection Systems - Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage principles.
    [!]
  • Intrusion Detection FAQ - Frequently asked questions about intrusion detection, from the SANS Institute.
    [!]
  • Raffael Marty: Intrusion Detection Resources - A good overall collection of IDS resources including links to log analysis, honeypot, and other useful tools. Also includes information regarding the THOR and Odin IDS projects.
    [!]
Volunteer to edit this category.
Copyright © 1998-2014 AOL Inc. Terms of Use
Visit our sister sites  mozilla.org | MusicMoz | Wikipedia

Last update: June 29, 2014 at 15:54:10 UTC - edit