Detecting Intrusions
Honey Pots
Bait Hosts
Fake ports
Commercial IDS Systems
Non-Commercial IDS Systems
Traffic Analysis Systems
Binary Checking Systems
Tripwire
Previous slide
Next slide
Back to first slide
View graphic version