Unformatted text preview: Question 5: What is the difference between statistical anomaly detection and rule-based intrusion detection? Restrict your answer to no more than two paragraphs. (Do some literature search on intrusion detection, if necessary.) Question 6: Problem 18.1 from Stallings. Hint: Use Bayes Rule. Question 7: What is salt in the context of Unix password management? (Material from Ch. 18 of Stallings). Solution sketch will be posted during the weekend. 1...
View Full Document
This document was uploaded on 09/17/2010.
- Spring '09