ACTIVE VS. PASSIVE NIDSS VII. SIGNATURES VIII. FALSE POSITIVES AND...
3.
Active vs. Passive NIDSs
vii.
Signatures
viii.
False Positives and Negatives
ix.
IDS Models
x.
Intrusion Prevention Systems
xi.
Honeypots and Honeynets
xii.
Firewalls
xiii.
Proxy Servers
xiv.
Internet Content Filters
xv.
Protocol Analyzers
xvi.
Network Mappers
xvii.
Anti-spam
Types of Attacks and Malicious Software
i.
Avenues of Attack.