Chapter 14. Intrusion Detection Systems
IN THIS CHAPTER
IDS Examples
Signature Scanners
IDS Theory
Sensitivity
Receiver Operating Characteristic Curves
Hacking Through IDSs
The Future of IDSs
Strict Anomaly Detection
Host Versus Network-Based IDSs
Geometric Display of Data
Intrusion detection systems (IDSs) provide an additional level of security for your wireless-enabled network. Although not specific to wireless, because of the growing demand for this information we have included a short chapter here for those who take a holistic approach to network security.
By adding wireless access to your network, you are dramatically increasing your risk of compromise. To counter this increased threat, you should also consider adding additional layers of security ...
Get Maximum Wireless Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.