Outline for June 1, 2004
A Posteriori
Design
Detect known violations of a policy
Mechanisms
Secure systems
Non-secure systems
Example: NFS
Example: LAFS
Principles of Intrusion Detection
Goals
Here is a PDF version of this document.