merkow ppt 12-JRM
merkow ppt 12-JRM
merkow ppt 12-JRM
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Intrusion Detection Systems (IDS)<br />
-Two Classes<br />
� Misuse intrusions<br />
� Well-defined attacks on known weak points within<br />
a system<br />
� Can be detected by watching for certain actions<br />
being performed on certain objects<br />
� Can use pattern matching techniques on audittrail<br />
information<br />
© Pearson Education Information Security:<br />
Principles and Practices 31