Intrusion Detection Systems-presentation slides

Intrusion: Break into, misuse, or exploit a system (against policy)
‰ Intruders: Insiders or outsiders Most IDS are designed for outsiders
‰ Vulnerability: Weakness that could be used by the attacker
‰ Threat: Party that exploits a vulnerability ‰ Structured Threat: Adversaries with a formal methodology, a
financial sponsor, and a defined objective.
‰ Unstructured Threat: Compromise victims out of intellectual curiosity

Free download research paper