ITET3 ITS Intrusion detection.odp

303 views
263 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
303
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

ITET3 ITS Intrusion detection.odp

  1. 1. IDS
  2. 2. Intrusion detection systems <ul><li>Start here </li></ul>
  3. 3. What is “intrusion”? <ul><li>M-w link </li></ul>
  4. 4. Mostly used IDSes <ul><li>And go here </li></ul>
  5. 5. Main types <ul><li>Two strategies </li><ul><li>Signature based
  6. 6. Anomaly based
  7. 7. A comparison </li></ul></ul><ul><li>Two locations </li><ul><li>Network
  8. 8. Host </li></ul></ul>Host IDS is mostly md5 sums on files and log file analysis
  9. 9. Software Linux software <ul><li>Aide
  10. 10. Tripwire
  11. 11. Snort </li></ul>Windows software <ul><li><google it>
  12. 12. Your firewall might doubles as IDS (and IPS) </li></ul>
  13. 13. Exercise <ul><li>Discuss where to put a signature based network IDS in your network topology.
  14. 14. (make a drawing)
  15. 15. Discuss where to put other IDS's. </li></ul>

×