intrusion detection system
sissetungituvastuse süsteem, IDS
olemus
automatiseeritud süsteem sissetungi tunnuste avastamiseks
ja neist alarmeerimiseks, näiteks ründe käekirja või
statistiliste anomaaliate põhjal
ISO/IEC 18043, 27033-1:
tehniline süsteem, millega tuvastada, et
sissetungi üritati, sissetung on toimumas
või on toimunud, ning millega võib-olla ka reageerida
sissetungidele infosüsteemidesse ja -võrkudesse
= technical system that is used to identify that an intrusion has been attempted, is occurring, or has occurred and possibly respond to intrusions in information systems and networks
ISO/IEC 27039:
infosüsteem, millega tuvastada, et sissetungi üritati,
sissetung on toimumas või on toimunud
= information systems used to identify that an intrusion has been attempted, is occurring, or has occurred
ülevaateid
https://www.youtube.com/watch?v=vOgFZa9cmoQ
http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/Part+V+Intrusion+Detection+Systems+IDS/Chapter+23+Intrusion+Detection+System+Overview/Intrusion+Detection+Systems+Overview/
https://en.wikipedia.org/wiki/Intrusion_detection_system
https://en.wikipedia.org/wiki/Category:Intrusion_detection_systems
https://www.giac.org/paper/gsec/4227/introduction-intrusion-detection-systems/106775
https://cybersecurity.springeropen.com/articles/10.1186/s42400-019-0038-7
http://www.controleng.com/single-article/wireless-security-tutorial-wireless-intrusion-detection-systems-and-wireless-attacks/7fbf22276df5d26605ae4c8722d8053c.html
https://www.alienvault.com/blogs/security-essentials/open-source-intrusion-detection-tools-a-quick-overview
http://www.diva-portal.org/smash/get/diva2:20134/FULLTEXT01.pdf
https://www.upguard.com/blog/top-free-network-based-intrusion-detection-systems-ids-for-the-enterprise
tuvastuse vältimine
https://www.blackhat.com/presentations/bh-usa-00/Ron-Gula/ron_gula.ppt
https://www.yeahhub.com/top-6-techniques-to-bypass-an-ids-intrusion-detection-system/
https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques
https://def.camp/wp-content/uploads/dc2015/tudordamian-idsevasiontechniques-151123083756-lva1-app6892.pdf
https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=ba77971f-f0c5-46f0-87bd-d9b1399a06be&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
vt ka
- hostipõhine sissetungituvastuse süsteem
- sissetungituvastus
- sissetungitõrje
- sissetungitõrje süsteem
- võrgupõhine sissetungituvastuse süsteem