IDS Resources


As you can probably tell by now, intrusion detection is not simply a matter of "plug-it-in-and-your- headaches -go-away." It requires monitoring, fine-tuning, and a willingness to keep your software and rules current with the day's threats. Although you should have plenty to start with, there are a number of additional intrusion detection tools and resources that you may be interested in. I recommend the following reading to help you get a better feeling for what is available and where IDS products are headed:

  • Threat Management: The State of Intrusion Detection , Steven J. Scott,

  • The Science of Intrusion Detection System Attack Identification , Cisco Systems,

  • A Distributed Autonomous-Agent Network-Intrusion Detection and Response System , Joseph Barrus, Neil C. Rowe,

  • Intrusion Detection: A Brief History and Overview , Richard A. Kemmerer and Giovanni Vigna,

  • Network Intrusion Detection Signatures , Karen Frederick,

  • The Use of Intrusion Detection in Securing Information Assets , Dr. David Dampier, Rayford B. Vaughn, Jr.,

  • Stateful Intrusion Detection for High-Speed Networks , Christopher Kruegel, Fredrik Valeur, Giovanni Vigna, Richard Kemmerer, proceedings /sp/1543/15430285abs.htm

  • LaBrea . ntrusion detection software that works by "appearing" to be an entire network of virtual machines, waiting for connection attempts, then mishandling the connections so that the attacker is stuck in the connection negotiation phase and is effectively knocked out.


Mac OS X Maximum Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158 © 2008-2017.
If you may any questions please contact us: