GIAC Intrusion Detection Curriculum

IDS strategies require on-going maintenance to ensure latest attacks will be detected and that the logs are carefully archived for future analysis and reference. As we have seen, we cannot be complacent by solely relying on the automated triggering of alerts or the lack of triggered alerts.
By
Toshi Iijma
April 7, 2009

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg