Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 14 Intrusion Detection. Hacker Capabilities.

Similar presentations


Presentation on theme: "Chapter 14 Intrusion Detection. Hacker Capabilities."— Presentation transcript:

1 Chapter 14 Intrusion Detection

2 Hacker Capabilities

3 Types of Attackers

4 TCP SYN Flood DoS Attack

5 Trinoo Network Attack

6 Tribal Flood Network (TFN) Attack

7 Buffer Overflow Attack

8

9 Detecting Intrusions  Statistical anomaly-based IDS –Uses thresholds for various types of activities  Pattern matching or signature-based IDS –Uses a set of rules to detect an attack –Content-based and context-based signatures  Cisco host-based and network-based IDS detect attacks based on signatures and anomalies

10 Types of Signatures

11 Case Study: Kevin Metnick’s Attack on Tsutomu Simomura’s ComputersTsutomu Simomura’s Computers


Download ppt "Chapter 14 Intrusion Detection. Hacker Capabilities."

Similar presentations


Ads by Google