๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Intrusion detection and response

โœ Scribed by Fred Cohen


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
112 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


Network firewalls have been in existence for a relatively short time, yet during this period the demands made of them have dramatically changed. To adapt to those changes, firewalls had to migrate among different platforms and operating systems. In addition, the core technology and architecture upon which they were based changed as well.


๐Ÿ“œ SIMILAR VOLUMES


Wireless intrusion detection
โœ Bruce Potter ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 93 KB

Wireless IDS systems have started to emerge in an effort to assist IT personnel in detecting malicious activities on a wireless network. The scope and complexity of the current offering of wireless IDS's vary dramatically. From homegrown wireless IDS's based on open source software to plug-ins to la

Advanced intrusion detection
๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 152 KB
Intrusion Detection Revisited
โœ E.Eugene Schultz ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 264 KB
Friend-assisted intrusion detection and
โœ S.A. Razak; S.M. Furnell; N.L. Clarke; P.J. Brooke ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 399 KB

Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in