Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this

Table Of Contents

The Evolution of Intent
Cisco Intrusion Prevention Strategy
Reducing the Grey
Cisco IPS Product Portfolio
Measurement Profiles for IPS
Media Rich and Transactional Performance
Cisco Intrusion Prevention Services
Cisco IPS Architecture
Cisco IPS Intelligent Detection Capabilities
Flexible Deployment
Cisco High-Performance IPS Applications
Securing Cisco Unified Communication Manager and Phones with Cisco IPS
IPS Terminology
Simple Pattern Matching
StatefulPattern Matching
Context StatefulPattern Matching
Protocol Decode-Based Analysis
Heuristic-Based Analysis
Anomaly-Based Analysis
Signature Example: Protection at Layer 2 (Data Link Layer)
Inspection Services
Universal Engines: Simple Example SigID5726: Kerberos Auth Failure
Universal Engines: Complex Example
Software and Modular Engines
Real-Time Anomaly Detection for Day Zero Threats
Anomaly Detection Zones and Knowledgebase
Anomaly Detection Histograms
IPS Terminology: False Positives Defined
Process for Accurate Threat Mitigation
Real-Time Risk-Based Policy
Endpoint Attack Relevance Visibility
Threat Rating
CustomisingYour Signature Set
Meta Signature On Box Correlation
Active Response Actions per Signature
Why Is the NormaliserRequired?
Reconstructing Flows
TTL Manipulation
IPS Sensor Packet Analysis
The Producer
Virtual Sensor Processors
Virtual Alarm Processors
Why Do We Need a Normaliser?
IP Normalisation—Why
IP Normalisation—How
Testing IPS: General Overview
NormaliserDeployment Issues
IPS Management & Monitoring
Small Deployment Robust Monitoring and Event Viewing: IPS Manager Express
Small Deployment Management and Troubleshooting: IPS Manager Express
Cisco Security Centre
Cisco Security Intelligence
Further Reading
Recommended Security Demos
Meet the Expert
Complete Your Online Session Evaluation
Cisco IPS E2 Engine Improvements
Cisco IPS E2 Engine Improvements cont
0 of .
Results for:
No results containing your search query
P. 1
SEC-2005 Deploying Network-Based Intrusion Prevention Sy

SEC-2005 Deploying Network-Based Intrusion Prevention Sy

Ratings: (0)|Views: 78 |Likes:
Published by HighFreak1c

More info:

Published by: HighFreak1c on Jun 18, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 40 are not shown in this preview.

Activity (12)

You've already reviewed this. Edit your review.
1 hundred reads
Harikumar Menon liked this
betofranco530 liked this
shr5000 liked this
Rhenz Kryzz liked this
enisb liked this
ms13395792 liked this
ms13395792 liked this
saikyawhtike liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->