Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection introduces you to the concepts of intrusion detection and the various intrusion detection products. Three of the most popular IDS systems (Unix/Linux and Windows Environment) are covered. This book shows you, step by step, how to start and work with an Intrusion Detection System.
- Computer Security and Intrusion Detection
- The Attack Framework and Attack Models
- Types and Categories of Intrusion Detection and Intrusion Preventing Systems
- Various kind of attacks, including Distributed DoS with Reflectors (DRDoS)
- Principles of an Intrusion Detection System
- Types of IDS Architecture
- Concepts of TCP/IP that is important for understanding the working of IDS
- Microsoft Internet Acceleration and Security Server 2004 (ISA SERVER 2004)
- Working with TCPDUMP
- SNORT Intrusion Detection System