Abstract
This second of two chapters on network security complements Chapter 10’s treatment of firewalls and tunnels. Here we discuss intrusion detection and various tools for network monitoring (packet sniffing) and vulnerability assessment, followed by denial of service and other network-based attacks that exploit standard TCP/IP network or Ethernet protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 The Author(s)
About this chapter
Cite this chapter
van Oorschot, P.C. (2020). Intrusion Detection and Network-Based Attacks. In: Computer Security and the Internet. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-33649-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-33649-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33648-6
Online ISBN: 978-3-030-33649-3
eBook Packages: Computer ScienceComputer Science (R0)