IAP, 470
IBM ERS, 66
iButton, 13
ICMP, 15, 291, 292, 297
Echo Reply, 16, 114
Echo Request, 114
ICN, 188
ICQ, 437
IDIP, 472
IDMEF, 470
IDS
creating custom signatures, 289
evaluation criteria, 255
pilot project, 256
IDS 4200, 191, 319
IDS Balancer, 358
IDS customers categories, 276
IDS database updating, 285
IDS/9000, 445
IDStest, 400
IDXP, 470
IFStatus, 434
IIS, 446
IMAP, 39
Implementation vulnerabilities, 32
Incident Response Team
IDWG workgroup, 431, 440, 465, 470
NSWC SHADOW Team, 41
SWAT, 341
X-Force, 341
Individuals:
Anderson, James P., 187
Cohen, Fred, 220
Crosbie, Mark, 188
Denning, Dorothy, 187
Farmer, Dan, 178
Gibson, William, 217
Guninsky, Georgy, 18
Mitnick, Kevin, 106
Neumann, Peter, 187
Spafford, Gene, 188
Venema, Wietse, 178
Whitehurst, Alan, 290
Information security training services, 233
Inline IDS, 214
Inspecting, 236
Integrated Computing Network, 188
Integrity Control System:
Advanced Intrusion Detection Environment, 225
AIDE, 225
Gog&Magog, 225
L5, 155, 225
MD5, 155, 288
Tripwire, 149, 155, 168, 224, 225, 234, 328, 399, 468
Intrusion Detection System, 61:
AID, 144
ASAX, 294
AUBAD, 143
Automated User Behavior Anomaly Detection, 143
BlackICE, 440
Centrax, 192, 213, 302, 399
Cisco IDSW 4210/4235/4250
Sensor, 66, 344, 393, 389, 401
Cisco Catalyst 2900XL/3500XL, 364
Cisco Catalyst 6500 IDS Module, 191, 205, 279, 388, 402, 454
Cisco Host IDS Sensor, 199
Cisco IDS, 262, 281, 301, 398, 431, 439
Cisco IDS 4200, 167, 189, 306, 312, 314, 315, 331, 393, 402, 422
Cisco IDS 4250, 356
Cisco IDS blade, 191
Cisco IDS Host Sensor, 158, 281
Cisco IOS Firewall Feature Set, 191, 305, 391
Cisco PIX Firewall, 392, 393, 432, 445
Cisco Secure IDS blade, 374
Cisco Secure Policy Manager, 320, 392
CMDS, 446
DIDS, 188
Dragon, 315, 319, 398
Dragon Sensor Appliance, 356
Dragon Sensor Workbench, 400
Dragon Server, 431
Dragon Squire, 431
EMERALD, 144, 172, 198
eTrustIDS, 302, 303, 315, 398
GASSATA, 144
GrIDS, 188
HostSentry, 199
IDES, 143, 187, 290
ID-Trak, 322
Intruder Alert, 190, 281, 321, 398, 447
LIDS, 190, 200, 399
ManHunt, 321, 356, 438, 447
MIDAS, 187, 290
Multics Intrusion Detection and Alerting System, 187, 290
NADIR, 188
NetProwler, 191, 198, 281, 292, 302, 303, 312, 321, 398, 409, 433, 446, 447
NFR NID, 302, 315, 390
NFR NID-320S, 356
NFR Security, 470
NIDES, 143, 172, 187, 290
NNID, 144
NSA, 188
NSM, 188
OpenWall, 200
PortSentry, 309
Proxy Stalker, 444
RealSecure, 262, 293, 398
RealSecure Desktop Protector, 281, 315
RealSecure for Nokia, 191, 279, 390, 402, 422
RealSecure Gigabit Sensor, 356, 454
RealSecure Guard, 446
RealSecure IDS, 392, 406
RealSecure Network Sensor, 104, 144, 167, 189, 243, 281, 290, 301, 302, 306, 307, 312, 315, 359, 393, 409, 431, 439, 452, 457, 461, 467
RealSecure OS Sensor, 399
RealSecure Server Sensor, 158, 168, 213, 281, 308, 376, 399, 446
RealSecure SiteProtector, 313, 316, 319, 320, 379, 422, 426
RealSecure Workgroup Manager, 319, 320
SecretNet, 168
Secure Networks Inc., 442, 444
Secure Shell, 432
SecureLogic, 295
SecureNet 7000, 356
SecureNet PRO, 295, 307, 315, 399, 446, 452
SessionWall-3, 283, 439
Smarter IDS, 317
SmIDS, 317
Snort, 149, 283, 290, 306, 319, 336, 399, 439, 457
Spitfire, 305, 334, 431
Stalker, 444
Swatch, 158, 199
USTAT, 145, 300
WebStalker, 444
WebStalker Pro, 169, 189
Internet Categorization of Attacks Toolkit, 471
Internet Service Providers, 279
Intruder Detection and Isolation Protocol, 472
IntruShield, 467
Intrusion, 36
Intrusion Alert Protocol, 470
Intrusion Detection Exchange Protocol, 470
Intrusion Detection Expert System, 187
Intrusion Detection Message Exchange Format, 470
Intrusion Detection Systems Consortium, 466, 467
Intrusion Detection Working Group, 465, 470
Intrusion.com, 356, 390, 442, 446, 467, 468
SecureNet 2000, 390
SecureNet 5000, 390
SecureNet 7000, 390
IntruVert, 467
IP, 297
addresses, 249
telephony, 380
IPX, 402
IPX/SPX, 11, 133, 204, 270
IRC, 437
ISP, 274
ISS, 32, 41, 66, 104, 135, 163, 240, 304, 401, 431, 438, 441, 442