Thank you so much for your response regarding my previous posts. I am requesting some tips on the simulation of 'Network Intrusion Detection'.
What are the required applications to be configured for core/access routers (host for the Network IDS) and other nodes (servers/clients to be protected by the IDS)? I mean the profile setup tips.
I always appreciate your help.
Sincerely,
Md H
Last edit: Md H 2015-01-06
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
We did not include an IDS application in NeSSi2, since we offer a lecture were students are tasked with developing a simple IDS application and we did not want provide a solution to them.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Dear Dr. Bsufka,
Thank you so much for your response regarding my previous posts. I am requesting some tips on the simulation of 'Network Intrusion Detection'.
What are the required applications to be configured for core/access routers (host for the Network IDS) and other nodes (servers/clients to be protected by the IDS)? I mean the profile setup tips.
I always appreciate your help.
Sincerely,
Md H
Last edit: Md H 2015-01-06
We did not include an IDS application in NeSSi2, since we offer a lecture were students are tasked with developing a simple IDS application and we did not want provide a solution to them.
I got it! Thanks.