Systems for Detecting Network Intrusion
From Computing and Software Wiki
(Difference between revisions)
Line 1: | Line 1: | ||
[[Osi/dode model for network stack]] | [[Osi/dode model for network stack]] | ||
- | [[network stack (dode) - attack patterns on each layer & how to defend it]] | + | [[network stack (dode): What each layer does - attack patterns on each layer - & how to defend it]] |
[[network intrusion detection system]] | [[network intrusion detection system]] |
Revision as of 19:53, 22 March 2008
Osi/dode model for network stack
network stack (dode): What each layer does - attack patterns on each layer - & how to defend it