YoVDO

IDS Performance in Constrained Environments

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Intrusion Detection Systems Courses Data Analysis Courses Cybersecurity Courses Denial-of-Service Attacks Courses

Course Description

Overview

Explore the performance of Intrusion Detection Systems (IDS) in constrained environments through this 46-minute conference talk by Shelton Wright from the University of Alabama Huntsville's Center for Cybersecurity Research and Education. Delve into host-based and network-based IDS, focusing on the Pitbull system and its modules. Examine data gathering techniques, test environments, and virtual machine configurations. Analyze test results, including denial of service scenarios, alerts, and Apache circuit alerts. Investigate the impact on hardware resources, such as disk usage, CPU usage, and packet drops. Gain valuable insights into IDS performance optimization for resource-limited settings.

Syllabus

Introduction
Hostbased IDS
Networkbased IDS
Goals
Overview
Pitbull
Pitbull Modules
Gathering Data
Test Environment
Virtual Environments
Virtual Machine Configuration
Results
Test Rules
Test Rules Results
Denial of Service
Alerts
Investigating
Apache Bench Test
Apache Circuit Alerts
Disk Usage
Hardware
Number of Alerts
CPU Usage
Packet Drops
Summary
Conclusion
Questions


Taught by

CAE in Cybersecurity Community

Related Courses

Social Network Analysis
University of Michigan via Coursera
Intro to Algorithms
Udacity
Data Analysis
Johns Hopkins University via Coursera
Computing for Data Analysis
Johns Hopkins University via Coursera
Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX