Chapter 14. Intrusion Detection Systems

IN THIS CHAPTER

  • IDS Examples

  • Signature Scanners

  • IDS Theory

  • Sensitivity

  • Receiver Operating Characteristic Curves

  • Hacking Through IDSs

  • The Future of IDSs

  • Strict Anomaly Detection

  • Host Versus Network-Based IDSs

  • Geometric Display of Data

Intrusion detection systems (IDSs) provide an additional level of security for your wireless-enabled network. Although not specific to wireless, because of the growing demand for this information we have included a short chapter here for those who take a holistic approach to network security.

By adding wireless access to your network, you are dramatically increasing your risk of compromise. To counter this increased threat, you should also consider adding additional layers of security ...

Get Maximum Wireless Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.