Introduction to Intrusion Detection
Feb 09, 1996
AbstractOver the last 3-4 years, the networking revolution has finally come of age. With vast financial possibilities opening up, the dangers of subversive action have become greater and greater. Often, intruders use vulnerabilities in the OS or application programs to compromise the security of systems. While we cannot realistically hope to prevent all such attacks and vulnerabilities, it is important that we be able to detect these subversive activities so that we may take preventive action, track down intruders and use the data gathered to try and prevent such happenings in the future. My talk will give an introduction to intrusion detection and why it is necessary; I will talk about the different types of IDS's and their advantages and disadvantages. From there on, it's pretty much where the audience wants it to go.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.