Network intrusion detection system

Results: 247



#Item
71Computer security / Data security / Crime prevention / National security / Intrusion detection system / Anomaly detection / Honeypot / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Security

Microsoft Word - NIST IntrusionDetectionSystems.doc

Add to Reading List

Source URL: www.21cfrpart11.com

Language: English - Date: 2004-02-27 15:21:35
72Software / Computing / Intrusion detection system / Honeyd / Geographic information system / Snort / Client honeypot / Computer network security / Honeypot / Cyberwarfare

SIXTH FRAMEWORK PROGRAMME Structuring the European Research Area Specific Programme RESEARCH INFRASTRUCTURES ACTION Contract No. RIDS

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2005-12-14 05:05:52
73Computing / Intrusion prevention system / Intrusion detection system / Check Point / Burglar alarm / TippingPoint / Bypass switch / Computer network security / Security / Computer security

PDF Document

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2009-09-18 10:10:34
74Security / Intrusion detection system / Anomaly detection / Vulnerability / Attack / Rootkit / Threat / Multics / Snort / Computer security / Computer network security / Cyberwarfare

IJIS: 14–35 / Digital Object Identifier (DOIs102070100001 Intrusion and intrusion detection John McHugh CERT Coordination Center∗ , Software Engineering Institute, Carnegie Mellon University,

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:40:14
75System software / Berkeley Packet Filter / Firewall / Packet capture / Netfilter / Packet switching / Filter / Transmission Control Protocol / Packet Processing / Computing / Computer network security / Network architecture

Enhancing Network Intrusion Detection With Integrated Sampling and Filtering Jose M. Gonzalez and Vern Paxson International Computer Science Institute Berkeley, California, USA , / ve

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:15:00
76Network architecture / Network intrusion detection system / Denial-of-service attack / Intrusion detection system / Packet capture / Firewall / Router / Packet loss / Network forensics / Computer network security / Computing / Software

Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-30 11:46:33
77Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-27 17:31:10
78Cyberwarfare / Computer security / Crime prevention / National security / Intrusion detection system / Network security / Telecommunications data retention / Threat / Surveillance / Computer network security / Security / Computing

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-07-14 15:42:26
79Internet protocols / Internet standards / Remote administration software / Telnet / Simple Network Management Protocol / Nmap / Cisco IOS / Network security / Router / Computing / Software / System software

8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone

Add to Reading List

Source URL: dcid.me

Language: English - Date: 2005-02-28 16:38:34
UPDATE