Universidade Federeal do Rio de Janeiro
Engenharia de Computacao e Informacao
Redes de Computadores II
Prof: Otto e Luis
 

Por: Rodrigo Maestrelli Leobons
rleobons@gmail.com

 
line decor
  
line decor
 
 
 
 

 
 
Bibliografia

[1] REHMAN, Rafeeq Ur. Intrusion Detection Systems with Snort. Prentice Hall PTR, New Jersey, USA, 2003.

[2] Honey Pot Project, em http://project.honeynet.org/

[3] Snort, em http://www.snort.org

[4] IDS detection approaches, em http://seclists.org/focus-ids/2007/Oct/0014.html

[5] Focus on IDS, em http://www.securityfocus.com/

[6] IDS, what is it and why do we need it?, em www.ixact.ch/english/pagesnav/framesE4.htm?IN&IN_Im.htm

[7] An Introduction to IDS, em http://www.securityfocus.com/infocus/1520

[8] Host-Based IDS vs Network-Based IDS, em http://www.windowsecurity.com/articles/Hids_vs_Nids_Part1.html

[9] Amorim, M E; Maestrelli, M. Sistemas de Detecção de Intrusos. CAT Informática, CBPF-NT-009/04.

[10] Intrusion Detection Systems, em http://www.windowsecurity.com/articles/Intrusion.html