Chapter 5: Intrusion Detection

 

 

The most prominent threats to computer system:

 

6.1 Intruders

 

 

6.2 Intrusion Detection

 

 

6.3 Host Based Intrusion Detection

 

§  Multivariate model

§  Markov process

§  Time series

§  Operational model

 

6.4 Distributed Host-based Intrusion Detection

 

 

6.5 Distributed Adaptive Intrusion Detection

 

 

6.6 Intrusion Detection Exchange Format:  Read briefly.

 

6.7 Honeypots

 

 

6.8 SNORT