Outline for June 1, 2004

  1. A Posteriori Design
    1. Detect known violations of a policy
  2. Mechanisms
    1. Secure systems
    2. Non-secure systems
  3. Example: NFS
  4. Example: LAFS
  5. Principles of Intrusion Detection
  6. Goals


Here is a PDF version of this document.