Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly modelsSpeaker: Nour Moustafa – Canberra, ACT, Australia
Topic(s): Security and Privacy
AbstractIn this lecture, we will discuss Intrusion Techniques Viruses and Worms. We will also describe the concepts of signature vs anomaly detection in network systems. We will Learn Signature Intrusion Detection using Snort and anomaly detection using machine learning models.
About this LectureNumber of Slides: 35
Duration: 45 minutes
Languages Available: English
Request this Lecture
To request this particular lecture, please complete this online form.
Request a Tour
To request a tour with this speaker, please complete this online form.
All requests will be sent to ACM headquarters for review.