The need for intrusion detection systems (IDS) is described. Several basic IDS design approaches and implementation methods are presented. Basic attack methods employed by network attackers and the resulting signatures are explained. The business case for justifying the acquisition of IDS is explored
|