Professional Documents
Culture Documents
Countermeasures
Sir. Ahmad Kamalrulzaman Othman
FSKM, UiTM Johor
Objectives
Introduction
Intrusion-Detection Systems (IDS) allow system
administrators to detect possible attacks to the
network. This chapter explores implementations
of IDS solutions. We also explore the concept of a
honey pot and how it can help administrators
track attackers of the network.
Preemptive blocking
Infiltration
Intrusion deflection
Intrusion deterrence
Anomaly detection
Preemptive Blocking
Infiltration
Intrusion Deflection
Intrusion Deterrence
Anomaly Detection
Anomalous Detection
Threshold monitoring
10
Anomaly Detection
Resource Profiling
11
Anomaly Detection
User/Group Work
Profiling
12
Anomaly Detection
Executable Profiling
13
Snort
Cisco Intrusion-Detection
14
Snort
Sniffer
Packet logger
Network intrusion-detection
15
Sniffer Mode
16
17
Network Intrusion-Detection
18
Cisco Intrusion-Detection
19
Specter
Symantec Decoy Server
20
Specter
21
Specter cont.
Open
Secure
Failing
Strange
Aggressive
22
Specter cont.
Easy
Normal
Hard
Fun
Warning
23
24
Summary
25
Summary cont.
26