Home |
FAQs, Help, and Tutorials (6) See Also:
Editor's Picks:
» Intrusion Detection FAQ
Frequently asked questions about intrusion detection, from the SANS Institute. http://www.sans.org/resources/idfaq/ Sites:
» An Introduction to Intrusion Detection Systems
Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage principles. http://www.intrusion-detection-system-group.co.uk » IDS Evasion Techniques (Security Focus)
Explanations of basic IDS evasion techniques as well as suggested fixes and countermeasures to such attacks. Topics covered include basic string-matching weaknesses, polymorphic shell code, session splicing, fragmentation attacks, and denial of service at http://www.securityfocus.com/infocus/1577 » Network-based intrusion-detection systems
IDS coverage from Network World, including an in-depth review of eight IDS products, tips for deployment and false alarm reduction, terminology glossary, and related news stories. http://www.networkworld.com/techinsider/2002/0624security.html » Raffael Marty: Intrusion Detection Resources
A good overall collection of IDS resources including links to log analysis, honeypot, and other useful tools. Also includes information regarding the THOR and Odin IDS projects. http://security.raffy.ch/Intrusion_Detection.php3 » Rules Definition for an Anomaly-Based IDS Solution
Information Security documentation, including a paper describing how to effectively use rule-based NIDS to perform anomaly intrusion detection. http://www.security-gurus.de/docs.php This category needs an editor
Last Updated: 2007-09-28 10:54:36
The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com |