Lecture 28: June 2, 2021
Reading
:
text
, §23.10, 26.1–26.3
Due
: Homework 5, due June 2; Lab 4, due June 3
Defenses
Scanning
Distinguishing between data and instructions
Containment
Specifications as restrictions
Limiting sharing
Statistical analysis
Trust
Basic intrusion detection
Basis
Anomaly detection (“what is unexpected is bad”)
Misuse (signature-based, rule-based) detection (“what is bad is known; everything else is good”)
Specification-based detection (“what is good is known; everything else is bad”)
Host-based intrusion detection
Network-based intrusion detection
Combined intrusion detection
Matt Bishop
Office: 2209 Watershed Sciences
Phone: +1 (530) 752-8060
Email:
[email protected]
ECS 153, Computer Security
Version of June 2, 2021 at 9:29AM
You can also obtain a PDF version of this.