Web Directory

  FAQs, Help, and Tutorials (6)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

See Also - Related Categories
Featured Websites in this category
http://www.sans.org/resources/idfaq/
Featured Site Intrusion Detection FAQ Open in a new browser windowLink Details
- Frequently asked questions about intrusion detection, from the SANS Institute.
- http://www.sans.org/resources/idfaq/

Lock this listing - So it can't be removed Report this listing Add a new Featured link

Regular Websites in this category

Rules Definition for an Anomaly-Based IDS Solution Open in a new windowLink Details
- Information Security documentation, including a paper describing how to effectively use rule-based NIDS to perform anomaly intrusion detection.
- http://www.security-gurus.de/docs.php

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Network-based intrusion-detection systems Open in a new windowLink Details
- IDS coverage from Network World, including an in-depth review of eight IDS products, tips for deployment and false alarm reduction, terminology glossary, and related news stories.
- http://www.nwfusion.com/techinsider/2002/0624security.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
An Introduction to Intrusion Detection Systems Open in a new windowLink Details
- Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage principles.
- http://www.intrusion-detection-system-group.co.uk

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Raffael Marty: Intrusion Detection Resources Open in a new windowLink Details
- A good overall collection of IDS resources including links to log analysis, honeypot, and other useful tools. Also includes information regarding the THOR and Odin IDS projects.
- http://security.raffy.ch/Intrusion_Detection.php3

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
IDS Evasion Techniques (Security Focus) Open in a new windowLink Details
- Explanations of basic IDS evasion techniques as well as suggested fixes and countermeasures to such attacks. Topics covered include basic string-matching weaknesses, polymorphic shell code, session splicing, fragmentation attacks, and denial of service a
- http://www.securityfocus.com/infocus/1577

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]