<--- Back to Details
First PageDocument Content
Computing / Intrusion detection system / Intrusion prevention system / Firewall / Network intrusion detection system / Denial-of-service attack / Network security / Anomaly detection / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security
Date: 2008-09-08 11:55:20
Computing
Intrusion detection system
Intrusion prevention system
Firewall
Network intrusion detection system
Denial-of-service attack
Network security
Anomaly detection
Intrusion detection system evasion techniques
Computer network security
Cyberwarfare
Computer security

Microsoft Word - IntruPro IPS White Paper1.doc

Add to Reading List

Source URL: usacac.army.mil

Download Document from Source Website

File Size: 247,36 KB

Share Document on Facebook

Similar Documents

Cyberwarfare / Secure communication / Denial-of-service attacks / Denial-of-service attack / Internet Relay Chat / Tor / Proxy server / Computer security / Draft:Energy related security attacks / Intrusion detection system evasion techniques

Denial-of-service attacks in Tor: Taxonomy and defenses Nick Mathewson The Tor Project Tor Tech Report

DocID: 1maCv - View Document

Technology / Wireless sensor network / Intrusion detection system / Wireless ad-hoc network / Wireless security / Telecommunications engineering / Computing / AAFID / Intrusion detection system evasion techniques / Wireless networking / Computer security / Computer network security

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

DocID: 19jWt - View Document

Computing / Intrusion detection system / Alert correlation / Thresh / Bayesian network / Snort / Intrusion detection system evasion techniques / Computer network security / Software / System software

Reasoning about Complementary Intrusion Evidenceāˆ— Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh, NC

DocID: 18NKY - View Document

Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

DocID: 14ISf - View Document

Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

DocID: 13tAz - View Document