[go: up one dir, main page]

Dunigan et al., 1999 - Google Patents

Intrusion detection and intrusion prevention on a large network: A case study

Dunigan et al., 1999

View HTML
Document ID
16048816591140064895
Author
Dunigan T
Hinkel G
Publication year
Publication venue
1st Workshop on Intrusion Detection and Network Monitoring (ID 99)

External Links

Snippet

This paper describes the general requirements for an Intrusion Prevention and Detection System and the methods used to prevent and detect intrusions into Oak Ridge National Laboratory's network. In this paper we describe actual intrusions, how they were detected …
Continue reading at www.usenix.org (HTML) (other versions)

Similar Documents

Publication Publication Date Title
Wack et al. Guidelines on firewalls and firewall policy
Fraser Site security handbook
Marinova-Boncheva A short survey of intrusion detection systems
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Toosarvandani et al. The risk assessment and treatment approach in order to provide LAN security based on ISMS standard
Sadiqui Computer network security
Fraser RFC2196: Site security handbook
Buchanan Introduction to security and network forensics
Sam et al. Survey of risks and threats in online learning applications
Dubrawsky How to cheat at securing your network
Dunigan et al. Intrusion detection and intrusion prevention on a large network: A case study
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Paquet Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide)
Davis Securing and controlling Cisco routers
Karamagi Comptia Security+ Practice Exams
Kishore Securing Postfix Mail servers from BruteForce attacks using containerization and Fail2ban
Gibson CISSP Rapid Review
Weber Network Security for EIS and ECS Systems
Adebayo et al. CST 805: Computer and Network Security
Asarcıklı Firewall monitoring using intrusion detection systems