Network-Based Intrusion Detection Systems
Marco Cremonini, University of Milan, Italy
Network Intrusion Detection Models
Protocol-Based Intrusion Detection
Understanding Protocol Semantics
From Packet-Grepping to Protocol-Based Intrusion Detection
NIDS Deployment and Management
Basic Requirements for Large Organizations
Limitations of NIDSs and Innovative Research Efforts
Intrusion Detection for Web-Based Applications
Combining Anomaly-Based and Signature-Based Intrusion Detection
INTRODUCTION
This chapter focuses on the characteristics of network-based intrusion detection systems (NIDSs). NIDSs collect data from packets in transit on a network segment for the purpose of identifying and preventing inappropriate network uses. NIDSs have several fundamental functional components:
- Source of observed events: The source-of-event information used to determine whether an intrusion has taken place. The most common sources are recorded from an individual computer system (in host-based IDSs) or by capturing network packets in transit (in network-based IDSs). ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.