Lecture 29: December 6, 2019

Reading: text>, §26.1–26.3
Due: Homework 5, due on December 6, 2019 at 11:59pm; Lab 3, due on December 6, 2019 at 11:59pm


  1. Greetings and felicitations!

  2. Examples
    1. Burroughs system
    2. Corporate site

  3. Basic intrusion detection
    1. Anomaly detection (“what is unexpected is bad”)
    2. Misuse (signature-based, rule-based) detection (“what is bad is known; everything else is good”)
    3. Specification-based detection (“what is good is known; everything else is bad’)


UC Davis sigil
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email: mabishop@ucdavis.edu
ECS 153, Computer Security
Version of December 10, 2019 at 12:39PM

You can also obtain a PDF version of this.

Valid HTML 4.01 Transitional Built with BBEdit Built on a Macintosh