Network intrusion detection system

Results: 247



#Item
221Software / Computer security / Data security / Intrusion detection system / System administration / AAFID / Anomaly detection / Snort / Misuse detection / Computer network security / Computing / System software

A Distributed Intrusion Detection Prototype using Security Agents V. Chatzigiannakis, G. Androulidakis, M. Grammatikou, B. Maglaris Network Management & Optimal Design Lab (NETMODE), ECE Department – National Technical

Add to Reading List

Source URL: www.netmode.ntua.gr

Language: English - Date: 2004-05-28 14:14:29
222Computer security / Intrusion detection system / Network intrusion detection system / Intrusion prevention system / Alert correlation / Bro / Snort / Suricata / Computer network security / System software / Software

School of Technology Module P00999 Dissertation Semester 2 – 2005

Add to Reading List

Source URL: inac.free.fr

Language: English - Date: 2005-08-03 14:14:48
223Computer security / Honeypot / Spamming / Public-key cryptography / Intrusion detection system / Civil law / Network intrusion detection system / Digital signature / Computer network security / Cyberwarfare / Cryptography

Honeycomb http://www.cl.cam.ac.uk/~cpk25/honeycomb Automated NIDS Signature Creation using Honeypots Christian Kreibich

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-01-16 15:06:05
224Internet / Network architecture / Internet standards / Transmission Control Protocol / Transport layer / Honeypot / User Datagram Protocol / Network intrusion detection system / Denial-of-service attack / Computer network security / Computing / Internet protocols

Honeycomb – Creating Intrusion Detection Signatures Using Honeypots Christian Kreibich, Jon Crowcroft University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom firstname.lastname

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-01-16 15:06:05
225Telecommunications engineering / Wireless security / Wi-Fi / Wireless LAN / Wireless access point / Wireless intrusion prevention system / Payment Card Industry Data Security Standard / Wireless network / Cracking of wireless networks / Wireless networking / Technology / Wireless

Business white paper Put wireless LAN security worry to rest HP Wi-Fi Clear Connect integrated intrusion detection

Add to Reading List

Source URL: h20195.www2.hp.com

Language: English
226Security / Network security / Zero-day attack / Layered security / Pass the hash / Attack / Intrusion prevention system / Password / Malware / Computer network security / Cyberwarfare / Computer security

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-10-18 12:50:24
227Security / Intrusion detection system / Information security / Snort / Topology / Computer network security / Computer security / Software

A Mission-Impact-Based Approach to INFOSEC Alarm Correlation† Phillip A. Porras, Martin W. Fong, and Alfonso Valdes SRI International 333 Ravenswood Avenue Menlo Park, CA[removed]

Add to Reading List

Source URL: www.sdl.sri.com

Language: English - Date: 2007-01-23 13:43:08
228Network security / Pass the hash / Zero-day attack / Intrusion prevention system / Password / Computer network security / Cyberwarfare / Computer security

IAD’s Top 10 Information Assurance Mitigation Strategies Fundamental aspects of network security involve protection and detection measures can be grouped in four mitigation goal areas. These four mitigation goal areas

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-01-28 11:17:24
229Computing / Network security / Netflow / Threat / Intrusion detection system / Cisco Security Monitoring /  Analysis /  and Response System / Managed security service / Computer network security / Cyberwarfare / Computer security

Managed By the numbers. Security

Add to Reading List

Source URL: www.onshore.com

Language: English - Date: 2013-05-21 23:29:00
230Cyberwarfare / Internet security / Network security / Firewall / Intrusion detection system / Application firewall / Personal firewall / Computer network security / Computer security / Computing

Microsoft Word - SECURITY STATEMENT FOR INTERNET BANKING.doc

Add to Reading List

Source URL: www.gulfbank.com

Language: English - Date: 2011-02-28 09:58:20
UPDATE