O'Reilly logo

Network Security Principles and Practices by Saadat Malik

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. What Is Intrusion Detection?

This chapter covers the following key topics:

  • The Need for Intrusion Detection— This section discusses the motivation behind having an intrusion detection system in place.

  • Types of Network Attacks Based on Mode of Attack— This section talks about the types of network attacks based on how they are conducted.

  • Types of Network Attacks Based on the Attack's Perpetrator— This section talks about network attacks based on who conducts them.

  • Common Network Attacks— This section further differentiates various types of attacks and discusses examples of some common types of attacks.

  • The Process of Detecting Intrusions— This section discusses the various techniques used to detect network attacks and intrusions. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required