Intrusion detection system evasion techniques

Results: 15



#Item
11Computing / Intrusion detection system / Intrusion prevention system / Firewall / Network intrusion detection system / Denial-of-service attack / Network security / Anomaly detection / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Microsoft Word - IntruPro IPS White Paper1.doc

Add to Reading List

Source URL: usacac.army.mil

Language: English - Date: 2008-09-08 11:55:20
12Computing / Intrusion detection system / Attack / OSSIM / Intrusion detection system evasion techniques / Computer security / Computer network security / Cyberwarfare

Introduction to Intrusion Detection Thomas R. Peltier, CISSP SM Driving eBusiness Performance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
13Computing / Intrusion detection system / Mobile agent / Software agent / Denial-of-service attack / AAFID / Intrusion detection system evasion techniques / Computer network security / Computer security / Cyberwarfare

INTRUSION DETECTION WITH MOBILE AGENTS Wayne A. Jansen National Institute of Standards and Technology 100 Bureau Dr., STOP 8930 Gaithersburg, MD 20899 (+[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
14Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
15Computer network security / Information technology management / Intrusion detection system / Anomaly detection / Wireless intrusion prevention system / Misuse detection / Intrusion detection system evasion techniques / Intrusion prevention system / Data security / Computer security / Security

ISSN:[removed]Dr Guruprasad Khataniar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), [removed]

Add to Reading List

Source URL: ijcscn.com

Language: English - Date: 2012-08-28 09:07:11
UPDATE