Network Intrusion Detection

Network Intrusion Detection - OverviewofNetworkIntrusion...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Overview of Network Intrusion  Detection By Dijiang Huang
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Attack Family Interdependency
Background image of page 2
Network Security Problems
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Security Problems - continued
Background image of page 4
Existing Internet Security Mechanisms Security mechanisms implement functions that help to prevent , detect , tolerate , respond to security attacks Prevention is ideal, but. .. Detection seeks to prevent by threat of punitive action Detection requires that the audit trail be protected from alteration If we can’t completely prevent attack from happening, detection is the only option There could be attacks we can’t detect, then live with it - survivable system Once detect the attack, then what? Active response!!!
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Existing Internet Security Mechanisms Prevention Firewall Authentication, authorization IPSEC/VPN Access control Encryption Detection Auditing Misuse detection Anomaly detection Survivability and Response
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 12

Network Intrusion Detection - OverviewofNetworkIntrusion...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online