How to build
and implement a simple intrusion detection system using TCP Wrappers and
Network Traffic: A Network Intrusion Detector's Look at Suspicious Events.(paper)
an Attempted Intrusion(paper)
about IDS and real examples.
Detection within a Secured Network(paper)
Evasion, and Denial of Service: Eluding Network Intrusion Detection(paper)
of knows ID Systems.
Ways to Defeat Your Intrusion Detection System(checklist)
is very interesting, especially for those security experts, who tries to
make own IDS.
Not so many
info as in previous, but somethig interesting here too.
Network Intrusion Detection Systems(faq)
Detection Pilot Program Guide(paper)
for Selecting an Intrusion Detection Partner.
Neural Networks for Misuse Detection(paper)
of such systems.
Computer Network Security Assessment(paper)
A short white
Detection: Challenges and Myths(paper)
For the CS Department head.
vs. Host-based Intrusion Detection(paper)
A Guide to
Intrusion Detection Technology.
Introduction to Intrusion Detection & Assessment(paper)
Nice and big