
Indications and Warnings Correlation
86
lượt xem 6
download
lượt xem 6
download

Welcome to the second half of the network based intrusion detection tutorial, where we will discuss more advanced analysis techniques based on Indications and Warnings as well as correlation. For every attack that really gets our attention, there are twenty or thirty probes or mapping attempts. Some of the common efforts are DNS zone transfers, DNS queries, SNMP queries, portmapper access attempts, and NetBIOS name lookups.
Chủ đề:
Bình luận(0) Đăng nhập để gửi bình luận!

CÓ THỂ BẠN MUỐN DOWNLOAD