Intrusion detection & prevention
16 aug. 2013Tags: Hig
Lecture notes
- Lecture 1 (Definition and classification of IDS systems)
- Lecture 2 (Misuse detection systems: Snort)
- Lecture 3 (Misuse detection systems: Bro and Suricata)
- Lecture 4 (Anomaly-based IDS)
- Lecture 5 (Testing and performance)
We have to write an individual project (30%) and we choose from the topics on the Fronter page
Term paper
S3_IDS_Cluster_analysis_and_its_application_in_anomaly_detection
size 307.0 KiB
sha256: cfeac7e55d...ac9c95ed5c
size 307.0 KiB
sha256: cfeac7e55d...ac9c95ed5c
My mind map
Books
- Some recommended literature is listed...
Evaluation
- 3 hour written exam (70%)
- Projects (30%)
Snarveier
Flere fra skole