In Partnership with AOL
See also:
  • IDS Evasion Techniques (Security Focus) - Explanations of basic IDS evasion techniques as well as suggested fixes and countermeasures to such attacks. Topics covered include basic string-matching weaknesses, polymorphic shell code, session splicing, fragmentation attacks, and denial of service attacks.
  • An Introduction to Intrusion Detection Systems - Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage principles.
  • Intrusion Detection FAQ - Frequently asked questions about intrusion detection, from the SANS Institute.
  • Raffael Marty: Intrusion Detection Resources - A good overall collection of IDS resources including links to log analysis, honeypot, and other useful tools. Also includes information regarding the THOR and Odin IDS projects.
Volunteer to edit this category.
Copyright © 1998-2015 AOL Inc. Terms of Use
Visit our sister sites | MusicMoz | Wikipedia

Last update: June 29, 2014 at 15:54:10 UTC - edit