Intrusion Detection Systems
Events and Alerts
Signatures and Patterns
Baselines and Normal Behavior
Anomalies and Deviations
True Positives
True Negatives
False Positives
False Negatives
Sensitivity and Specificity
Attack Vectors
Exploits and Vulnerabilities
Payloads and Malware
Indicators of Compromise
Detection Rate
Alert Volume
Processing Latency
Resource Utilization
Previous
1. Introduction to Intrusion Detection Systems
Go to top
Next
3. IDS Classification by Deployment Location