Download presentation
Presentation is loading. Please wait.
1
Chapter 14 Intrusion Detection
2
Hacker Capabilities
3
Types of Attackers
4
TCP SYN Flood DoS Attack
5
Trinoo Network Attack
6
Tribal Flood Network (TFN) Attack
7
Buffer Overflow Attack
9
Detecting Intrusions Statistical anomaly-based IDS –Uses thresholds for various types of activities Pattern matching or signature-based IDS –Uses a set of rules to detect an attack –Content-based and context-based signatures Cisco host-based and network-based IDS detect attacks based on signatures and anomalies
10
Types of Signatures
11
Case Study: Kevin Metnick’s Attack on Tsutomu Simomura’s ComputersTsutomu Simomura’s Computers
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.