Outline for March 1, 2001

  1. Greetings and felicitations!
    1. Project presentations begin in a week ...
  2. Intrusion Detection
    1. What is an intrusion?
    2. Principles of detection
    3. Example: rootkit intrusion
    4. IDS architecture
    5. Models: anomaly, misuse, specification
    6. NSM
    7. DIDS
  3. Malicious Logic
    1. What is it?
    2. Most basic form: Trojan horse
    3. Computer viruses: executable, boot, TSR, stealth, encrypted, p;olymorphic)
    4. Computer worms (Internet worm)
    5. Bacteria
    6. Logic bombs
    7. Defenses

    Matt Bishop
    Office: 3059 Engineering Unit II Phone: +1 (530) 752-8060
    Fax: +1 (530) 752-4767
    Email: [email protected]
    Copyright Matt Bishop, 2001. All federal and state copyrights reserved for all original material presented in this course through any medium, including lecture or print.

    Page last modified on 3/2/2001