Directory > Computers > Security > Intrusion Detection Systems > FAQs, Help, and Tutorials Network-based intrusion-detection systems IDS coverage from Network World, including an in-depth review of eight IDS products, tips for deployment and false alarm reduction, terminology glossary, and related news stories. http://www.nwfusion.com/techinsider/2002/0624security.html Reviews Rating: Not yet Rated
Whois Check
An Introduction to Intrusion Detection Systems Detailed introductory guide to intrusion detection systems, both host and network-based. The Dragon IDS Suite is used to demonstrate usage principles. http://www.intrusion-detection-system-group.co.uk Reviews Rating: Not yet Rated
Whois Check
InfoSysSec Portal Security portal featuring computer and networking security resources relating to intrusion detection and prevention. Information is presented in FAQ structure for easy navigation. http://www.infosyssec.net/infosyssec/intdet1.htm Reviews Rating: Not yet Rated
Whois Check
WindowSecurity.com IDS FAQ Provides a list of Frequently Asked Questions relating to Intrusion Detection Systems. http://www.intrusiondetectionfaq.com Reviews Rating: Not yet Rated
Whois Check
Raffael Marty: Intrusion Detection Resources A good overall collection of IDS resources including links to log analysis, honeypot, and other useful tools. Also includes information regarding the THOR and Odin IDS projects. http://security.raffy.ch/Intrusion_Detection.php3 Reviews Rating: Not yet Rated
Whois Check
Intrusion Detection FAQ Frequently asked questions about intrusion detection, from the SANS Institute. http://www.sans.org/resources/idfaq/ Reviews Rating: Not yet Rated
Whois Check
SecurePoint IDS Mailing List Searchable archive of SecurePoint Technologies' IDS mailing list. http://msgs.securepoint.com/ids Reviews Rating: Not yet Rated
Whois Check
IDS Evasion Techniques (Security Focus) Explainations of basic IDS evasion techniques as well as suggested fixes and countermeasures to such attacks. Topics covered include basic string-matching weaknesses, polymorphic shell code, session splicing, fragmentation attacks, and denial of service attacks. http://www.securityfocus.com/infocus/1577 Reviews Rating: Not yet Rated
Whois Check
|