Intrusion
Detection
Systems
“From bits to information”
Outline
• Attack Patterns.
• SNORT.
• IDS Types
Attack Patterns
“From bits to information”
Intrusion Patterns
Host-based or Network-
based
IDS Placement
Snort
“From bits to information”
Snort
Example of Snort Rule
Example Snort Rule
Example Snort Rule
Example Snort Rule
Intrusion
Detection
Systems
“From bits to information”
Port sweep
Ping sweep
Login sweep
In-line/out-of-line
Intrusion
Detection
Systems
“From bits to information”