Dunigan et al., 1999 - Google Patents
Intrusion detection and intrusion prevention on a large network: A case studyDunigan et al., 1999
View HTML- Document ID
- 16048816591140064895
- Author
- Dunigan T
- Hinkel G
- Publication year
- Publication venue
- 1st Workshop on Intrusion Detection and Network Monitoring (ID 99)
External Links
Snippet
This paper describes the general requirements for an Intrusion Prevention and Detection System and the methods used to prevent and detect intrusions into Oak Ridge National Laboratory's network. In this paper we describe actual intrusions, how they were detected …
- 238000001514 detection method 0 title abstract description 18
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wack et al. | Guidelines on firewalls and firewall policy | |
Fraser | Site security handbook | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Toosarvandani et al. | The risk assessment and treatment approach in order to provide LAN security based on ISMS standard | |
Sadiqui | Computer network security | |
Fraser | RFC2196: Site security handbook | |
Buchanan | Introduction to security and network forensics | |
Sam et al. | Survey of risks and threats in online learning applications | |
Dubrawsky | How to cheat at securing your network | |
Dunigan et al. | Intrusion detection and intrusion prevention on a large network: A case study | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Paquet | Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide) | |
Davis | Securing and controlling Cisco routers | |
Karamagi | Comptia Security+ Practice Exams | |
Kishore | Securing Postfix Mail servers from BruteForce attacks using containerization and Fail2ban | |
Gibson | CISSP Rapid Review | |
Weber | Network Security for EIS and ECS Systems | |
Adebayo et al. | CST 805: Computer and Network Security | |
Asarcıklı | Firewall monitoring using intrusion detection systems |