Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly modelsĀ 

Speaker:  Nour Moustafa – Canberra, ACT, Australia
Topic(s):  Security and Privacy

Abstract

In this lecture, we will discuss Intrusion Techniques Viruses and Worms. We will also describe the concepts of signature vs anomaly detection in network systems.  We will Learn Signature Intrusion Detection using Snort and anomaly detection using machine learning models. 

About this Lecture

Number of Slides:  35
Duration:  45 minutes
Languages Available:  English
Last Updated: 

Request this Lecture

To request this particular lecture, please complete this online form.

Request a Tour

To request a tour with this speaker, please complete this online form.

All requests will be sent to ACM headquarters for review.