Putting Intrusion Detection into Intrusion Detection Systems

Presented at Black Hat USA 1999, July 7, 1999, 5:10 p.m. (60 minutes).

Most, if not all, activities of present intrusion detection systems are involved with the detection and reporting of attacks; worse, these are deflected attacks. IDS devices are typically placed outside of perimeter defenses, and treat only incoming traffic.


Presenters:

  • Jon David - Senior editor Computers & Security.

Similar Presentations: