Detection
Outline
Chapter 7 Detection Mechanisms, Indicators of Compromise, and Signatures
Chapter 8 Reputation-Based Detection
Chapter 9 Signature-Based Detection with Snort and Suricata
Chapter 10 The Bro Platform
Chapter 11 Anomaly-Based Detection with Statistical Data
Chapter 12 Using Canary Honeypots for Detection
35.175.107.142