Communications and Computer Network Protocol Design Models
The Five-Layer TCP/IP Model: Description/Attacks/Defense
Network Intrusion Detection System
False Alarms & How To Provide Them
Host based & Network based IDS