From 8eba9b015a83f6d6220afa0315fe2266e25f01d9 Mon Sep 17 00:00:00 2001 From: Jet Hughes Date: Thu, 20 Oct 2022 14:52:58 +1300 Subject: [PATCH] vault backup: 2022-10-20 14:52:58 --- content/notes/25-network-security-2.md | 16 +++++++++++++--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/content/notes/25-network-security-2.md b/content/notes/25-network-security-2.md index 4d6e56e2f..30a9cf07a 100644 --- a/content/notes/25-network-security-2.md +++ b/content/notes/25-network-security-2.md @@ -118,8 +118,18 @@ three types limitaitons - IP spoofing - if multiple apps need special treatment, each has own app. gateway -- client software must know how to ocnt +- client software must know how to contact gateway + - e.g., must set IP of proxy in browser +- filters oftenuser all or nothing policy for UDP +- tradeoff: access with security +# IDS +- instrusion detection system +- deep packet inspection + - look at contents (e.g., check strings in packet against DB of known virus, attack strings) +- examine correlation among packets + - port scanning + - network mapping + - DoS attack - -# IDS \ No newline at end of file +multiple IDSs: different types of checking at different locations \ No newline at end of file