skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Network intrusion detector: NID user`s guide V 1.0

Technical Report ·
DOI:https://doi.org/10.2172/10176285· OSTI ID:10176285

The NID suite of software tools was developed to help detect and analyze intrusive behavior over networks. NID combines and uses three techniques of intrusion detection: attack signature recognition, anomaly detection, and a vulnerability risk model. The authors have found from experience that the signature recognition component has been the most effective in detecting network based attacks. The underlying assumption of NID is that there is a security domain that you are interested in protecting. NID monitors traffic that crosses the boundary of that domain, looking for signs of intrusion and abnormal activity.

Research Organization:
Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)
Sponsoring Organization:
USDOE, Washington, DC (United States)
DOE Contract Number:
W-7405-ENG-48
OSTI ID:
10176285
Report Number(s):
UCRL-MA-116609; ON: DE94017412; TRN: AHC29419%%61
Resource Relation:
Other Information: PBD: Apr 1994
Country of Publication:
United States
Language:
English