Outline for June 2, 2005
-
IDS Models
-
Anomaly detection
-
Misuse modeling
-
Specification modeling
-
Architecture
-
Agent
-
Director
-
Notifier
-
Organization of IDS
-
Monitoring network traffic
-
Combining host and network monitoring
-
Autonomous agents
-
Intrusion Response
-
Prevention
-
Handling
-
Containment phase
-
Eradication phase
-
Follow-up phase
Here is a PDF version of this document.