Network intrusion detector: NID user`s guide V 1.0
- ed.
The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.
- Research Organization:
- Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
- Sponsoring Organization:
- USDOE, Washington, DC (United States)
- DOE Contract Number:
- W-7405-ENG-48
- OSTI ID:
- 10176285
- Report Number(s):
- UCRL-MA-116609; ON: DE94017412; TRN: AHC29419%%61
- Resource Relation:
- Other Information: PBD: Apr 1994
- Country of Publication:
- United States
- Language:
- English
Similar Records
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Real-time Intrusion Detection for High-bandwidth Research Networks using Unsupervised Deep Learning
Journal Article
·
Wed Mar 16 00:00:00 EDT 2022
· International journal of information security
·
OSTI ID:10176285
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Conference
·
Wed Sep 19 00:00:00 EDT 2007
·
OSTI ID:10176285
+4 more
Real-time Intrusion Detection for High-bandwidth Research Networks using Unsupervised Deep Learning
Conference
·
Wed Jan 01 00:00:00 EST 2020
·
OSTI ID:10176285