12

Weapons of Our Warfare

Next-Generation Techniques and Tools for Detection, Identification, and Analysis

Information in this chapter

• Legacy Firewalls

• Antivirus

• Intrusion Detection Systems and Intrusion Prevention Systems

• What Is in a Name?

• MOSAIC

• Advanced Meta-Network Security Analysis

• Next Generation Security Framework

Introduction

Defending against next-generation threats and attacks is going to require more than your traditional firewall, antivirus (AV), and intrusion detection systems (IDSs). The majority of these technologies have provided extreme benefit in the 1990s and at the very beginning of 2000s, and are still considered best practices among most security professionals. However, those best practices in isolation that ...

Get Cybercrime and Espionage now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.