26.10.2012 Views

merkow ppt 12-JRM

merkow ppt 12-JRM

merkow ppt 12-JRM

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Intrusion Detection Systems (IDS)<br />

-Two Classes<br />

� Misuse intrusions<br />

� Well-defined attacks on known weak points within<br />

a system<br />

� Can be detected by watching for certain actions<br />

being performed on certain objects<br />

� Can use pattern matching techniques on audittrail<br />

information<br />

© Pearson Education Information Security:<br />

Principles and Practices 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!