INSPIRING FUTURES

Security and forensic computing: intrusion detection systems.

Buchanan, William J (2010) Security and forensic computing: intrusion detection systems. [Video]

[img] HTML
sfc_unit02.html
Available under License Creative Commons Attribution Non-commercial.

Download (505B)
[img]
Preview
PDF
unit03_ids.pdf
Available under License Creative Commons Attribution Non-commercial.

Download (7MB)

Abstract/Description

2 INTRUSION DETECTION SYSTEMS 50
2.1 Introduction 50
2.2 Types of intrusion 53
2.3 Attack patterns 54
2.4 Host/network-based intrusion detection 55
2.5 Placement of the IDS 57
2.6 SNORT 59
2.7 Example rules 61
2.8 Running Snort 67
2.9 User, machine and network profiling 73
2.10 Honey pots 74
2.11 In-line and out-of-line IDSs 76
2.12 False and true 77
2.13 Customized Agent-based IDS 78
2.14 Tutorial 79
2.15 Software tutorial 81

Item Type: Video
Uncontrolled Keywords: Intrusion detection systems; data security; honeypots; agent-based; networks; hosts; user identification; authentication; hackers; viruses; worms; Trojan; firewall; gateway;
University Divisions/Research Centres: Faculty of Engineering, Computing and Creative Industries > School of Computing
Dewey Decimal Subjects: 000 Computer science, information & general works >
000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security
Library of Congress Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Item ID: 4058
Depositing User: Professor Bill Buchanan
Date Deposited: 11 Jan 2011 16:46
Last Modified: 12 Jan 2011 04:57
URI: http://researchrepository.napier.ac.uk/id/eprint/4058

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics

Edinburgh Napier University is a registered Scottish charity. Registration number SC018373