Using Basic Security Module (BSM), Tripwire, System Logs, and Symantec's ITA for Audit Data C

There are 2 main sources of information regarding intrusion detection to a networked computer system: networking traffic and auditing files. A more effective intrusion detection system (IDS) is provided when a multi-layered security approach is incorporated into a network of computers. Whatever...
Philip DiFato
September 22, 2001

All papers are copyrighted. No re-posting of papers is permitted