Attacking Techniques and Intrusion Detection: Getting insights of Signature vs Anomaly modelsĀ
Speaker: Nour Moustafa – Canberra, ACT, AustraliaTopic(s): Security and Privacy
Abstract
In this lecture, we will discuss Intrusion Techniques Viruses and Worms. We will also describe the concepts of signature vs anomaly detection in network systems. We will Learn Signature Intrusion Detection using Snort and anomaly detection using machine learning models.About this Lecture
Number of Slides: 35Duration: 45 minutes
Languages Available: English
Last Updated:
Request this Lecture
To request this particular lecture, please complete this online form.
Request a Tour
To request a tour with this speaker, please complete this online form.
All requests will be sent to ACM headquarters for review.