|
Articles and Papers
Articles
-
Intrusion Detection Systems
Comparative analyses of Intrusion Detection Systems.
-
COAST Intrusion Detection Hotlist
-
Intrusion Detection List of Michael Sobirey
-
Intrusion Detection FAQs
Frequently Asked Questions about Intrusion Detection Systems.
-
Network Intrusion Detection Systems FAQ
-
PacketNexus IDS FAQ
-
SANS Intrusion Detection FAQ
-
Intrusion Detection Terminology (A-H)
A compendium of IDS-related terms and concepts.
-
Readings in Intrusion Detection
A substantial list of IDS-related readings.
-
The Role of Intrusion Detection Systems
For those who aren't sure if an IDS is necessary for their security needs.
Technical Papers
-
Denial-of-Service Resistant IDS Architecture
How to construct an intrusion detection framework capable of mitigating an all-out attack.
-
Hacker Tools and Their Signatures [ Part 1 | Part 2 | Part 3 ]
A comprehensive series on the core data on which intrusion detection systems (IDS) are built.
-
How to Make a Sniffing UTP Cable Page
A means of cloaking an IDS against detection.
-
Internet Security Auditing Handouts
From the security class by Dan Farmer and Wietse Venema.
-
IS Auditing Guidelines
Overview of procedures for those new to auditing IT infrastructures.
-
LinuxSecurity Intrusion Detection Primer
A primer for those seeking to ramp up on Intrusion Detection.
-
NIST Guideline on Network Security Auditing
General primer for those new to security auditing.
-
NIST IDS Overview
A comprehensive overview of Intrusion Detection Systems and related technologies.
-
One-Way CAT5 Cable for IDS Deployments
One sure-fire way to make one's IDS invisible to outsiders.
-
Snort Installation and Basic Usage page
A good starting point for those new to Snort and IDS.
Writers welcomed! If you have a technical paper or article pertaining to
security tools and practices, please submit it.
|
|