Intrusion Detection
This lecture covers the following topics:
- Concepts
- Intrusion vs. Extrusion Detection
- Examples of Intrusion
- Categories of Intruders
- Hacker Behavior Example
- Criminal Enterprise Behavior
- Insider Behavior Example
- Intrusion Techniques
- Password Guessing and Capture
- Notification Alarms
- Types of IDS
- Sample Signatures
- Anomaly Based IDS
- Statistical Anomaly Detection
- Audit Records
- Rule-Based Intrusion Detection
- Types of IDS
- Host vs. Network IDS
- Honeypots
- Password Management
- Managing Passwords
Presentation slides in Adobe Acrobat Format:
1 slide/page
View Slides+Audio
(on YouTube)
View Slides+Audio
(Using Flash)
Right click and save to download
Slides+Audio podcast.
Frequently asked questions about remote audio/video viewing
Back to other lectures of the series
Complete List of Audio/Video Lectures by Raj Jain
Back to Raj Jain's Home Page