YoVDO

IDS Performance in Constrained Environments

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Intrusion Detection Systems Courses Data Analysis Courses Cybersecurity Courses Denial-of-Service Attacks Courses

Course Description

Overview

Explore the performance of Intrusion Detection Systems (IDS) in constrained environments through this 46-minute conference talk by Shelton Wright from the University of Alabama Huntsville's Center for Cybersecurity Research and Education. Delve into host-based and network-based IDS, focusing on the Pitbull system and its modules. Examine data gathering techniques, test environments, and virtual machine configurations. Analyze test results, including denial of service scenarios, alerts, and Apache circuit alerts. Investigate the impact on hardware resources, such as disk usage, CPU usage, and packet drops. Gain valuable insights into IDS performance optimization for resource-limited settings.

Syllabus

Introduction
Hostbased IDS
Networkbased IDS
Goals
Overview
Pitbull
Pitbull Modules
Gathering Data
Test Environment
Virtual Environments
Virtual Machine Configuration
Results
Test Rules
Test Rules Results
Denial of Service
Alerts
Investigating
Apache Bench Test
Apache Circuit Alerts
Disk Usage
Hardware
Number of Alerts
CPU Usage
Packet Drops
Summary
Conclusion
Questions


Taught by

CAE in Cybersecurity Community

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera