Network intrusion detector: NID user`s guide V 1.0
- ed.
The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.
- Research Organization:
- Lawrence Livermore National Lab., CA (United States)
- Sponsoring Organization:
- USDOE, Washington, DC (United States)
- DOE Contract Number:
- W-7405-ENG-48
- OSTI ID:
- 10176285
- Report Number(s):
- UCRL-MA--116609; ON: DE94017412
- Country of Publication:
- United States
- Language:
- English
Similar Records
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
Conference
·
Wed Sep 19 00:00:00 EDT 2007
·
OSTI ID:935341
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
Journal Article
·
Sun Jul 31 20:00:00 EDT 2022
· Int.J.Inf.Secur.
·
OSTI ID:1867680