Chapter 17: Network security
Hacking is an exciting and sometimes scary phenomenon, depending on which side of the battlements you happen to be standing.
—Marcus J. Ranum
Abstract
Anomaly detection can potentially detect new types of attacks that signature-based systems will miss. Unfortunately, anomaly detection systems are prone to falsely identifying events as malicious. Thus, this chapter does not address anomaly-based methods. Meanwhile signature-based systems are highly popular due to their relatively simple implementation and their ability to detect commonly used attack tools. This chapter samples three important subtasks that arise in the context of intrusion detection. The first is an analysis subtask, string matching, which is a key bottleneck ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access