Intrusion detection and response
โ Scribed by Fred Cohen
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 112 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
Network firewalls have been in existence for a relatively short time, yet during this period the demands made of them have dramatically changed. To adapt to those changes, firewalls had to migrate among different platforms and operating systems. In addition, the core technology and architecture upon which they were based changed as well.
๐ SIMILAR VOLUMES
Wireless IDS systems have started to emerge in an effort to assist IT personnel in detecting malicious activities on a wireless network. The scope and complexity of the current offering of wireless IDS's vary dramatically. From homegrown wireless IDS's based on open source software to plug-ins to la
Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication between nodes. The need for such a fixed supporting infrastructure limits the adaptability and usability of the wireless network, especially in