The Tao of Network Security Monitoring Beyond Intrusion Detection
标签: Monitoring Intrusion Detection Security
上传时间: 2014-08-15
上传用户:zwei41
Intrusion Detection:Host-based Network Intrusion Detection • At each host, monitor all incoming and outgoing network traffic – for each packet: – Analyze 4-tuple and protocol – Examine contents
标签: Intrusion Detection Host-based Network
上传时间: 2014-01-11
上传用户:ikemada
The Algorithm of Detectors Generating in Intrusion Detection System Based on Artificial Immune Theory
标签: Artificial Generating Algorithm Detectors
上传时间: 2013-12-27
上传用户:阳光少年2016
about Intrusion detection system of mobile agent
标签: Intrusion detection system mobile
上传时间: 2014-01-01
上传用户:Miyuki
『下载说明』这里提供给大家的是早已金盆洗手的著名黑客KEVIN D. MITNICK将其一生积累下来的丰富技能汇集成书的《The Art of Intrusion》(入侵的艺术)英文版的PDF格式电子书下载。
标签: D. Intrusion MITNICK KEVIN
上传时间: 2014-01-14
上传用户:cc1
using genetic algorithm in network Intrusion detection systems
标签: algorithm detection Intrusion genetic
上传时间: 2017-06-28
上传用户:whenfly
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
标签: Framework different Security Response
上传时间: 2013-12-03
上传用户:ippler8
在网络安全中经常会遇到rootkit,NSA安全和入侵检测术语字典( NSA Glossary of Terms Used in Security and Intrusion Detection)对rootkit的定义如下:A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network,mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.
上传时间: 2017-04-04
上传用户:xaijhqx
New applications such as video conferencing, video on demand, multi- media transcoders, Voice-over-IP (VoIP), Intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques.
标签: Programmable Networks Active and
上传时间: 2020-05-26
上传用户:shancjb