Outline for May 31, 2005

  1. Access Control Mechanisms
    1. Access control lists
    2. Capabilities
    3. Locks and Keys
    4. Type checking
    5. Ring-based access control
    6. PACLs
  2. IDS Models
    1. Anomaly detection
    2. Misuse modeling
    3. Specification modeling
  3. Architecture
    1. Agent
    2. Director
    3. Notifier
  4. Organization of IDS
    1. Monitoring network traffic
    2. Combining host and network monitoring
    3. Autonomous agents


Here is a PDF version of this document.