Prerequisite: COMP 301.
This course covers techniques and algorithms for detecting unusual usage patterns that typically signal a break-in, including techniques for detecting evasive or stealthy attacks. Also covered are differences in detecting local versus network intruders. Additional topics: computer viruses, computer security management, computer forensics.
Outcomes: Students will learn to configure ID systems (eg SNORT) and analyze their output; They will also understand both network-based and host-based monitoring techniques.
This course covers techniques and algorithms for detecting unusual usage patterns that typically signal a break-in, including techniques for detecting evasive or stealthy attacks. Also covered are differences in detecting local versus network intruders. Additional topics: computer viruses, computer security management, computer forensics.
Outcomes: Students will learn to configure ID systems (eg SNORT) and analyze their output; They will also understand both network-based and host-based monitoring techniques.