[Treachery Unlimited Logo] Treachery Unlimited: A Computer & Network Security Information Clearinghouse Site

Advisory Agencies
Articles and Tutorials
Security Tools
Site Search
Feedback to Webmaster
Articles and Papers

Auditing and Intrusion DetectionBastion Hosts and Hardened OS'sCryptography and RelatedFirewalls and Packet FilteringNetworks and NetworkingTutorials

Articles

  1. Intrusion Detection Systems
    Comparative analyses of Intrusion Detection Systems.
    1. COAST Intrusion Detection Hotlist
    2. Intrusion Detection List of Michael Sobirey
  2. Intrusion Detection FAQs
    Frequently Asked Questions about Intrusion Detection Systems.
    1. Network Intrusion Detection Systems FAQ
    2. PacketNexus IDS FAQ
    3. SANS Intrusion Detection FAQ
  3. Intrusion Detection Terminology (A-H)
    A compendium of IDS-related terms and concepts.
  4. Readings in Intrusion Detection
    A substantial list of IDS-related readings.
  5. The Role of Intrusion Detection Systems
    For those who aren't sure if an IDS is necessary for their security needs.

Technical Papers

  1. Denial-of-Service Resistant IDS Architecture
    How to construct an intrusion detection framework capable of mitigating an all-out attack.
  2. Hacker Tools and Their Signatures [ Part 1 | Part 2 | Part 3 ]
    A comprehensive series on the core data on which intrusion detection systems (IDS) are built.
  3. How to Make a Sniffing UTP Cable Page
    A means of cloaking an IDS against detection.
  4. Internet Security Auditing Handouts
    From the security class by Dan Farmer and Wietse Venema.
  5. IS Auditing Guidelines
    Overview of procedures for those new to auditing IT infrastructures.
  6. LinuxSecurity Intrusion Detection Primer
    A primer for those seeking to ramp up on Intrusion Detection.
  7. NIST Guideline on Network Security Auditing
    General primer for those new to security auditing.
  8. NIST IDS Overview
    A comprehensive overview of Intrusion Detection Systems and related technologies.
  9. One-Way CAT5 Cable for IDS Deployments
    One sure-fire way to make one's IDS invisible to outsiders.
  10. Snort Installation and Basic Usage page
    A good starting point for those new to Snort and IDS.

Writers welcomed! If you have a technical paper or article pertaining to security tools and practices, please submit it.


Copyright © 1999 - 2011 • Treachery Unlimited.
Last updated on Sunday, 11-Apr-2004 01:48:44 MST Privacy Policy