|
http://www.redbooks.ibm.com/abstracts/redp4226.html "*Abstract* The Intrusion Detection System (IDS), introduced in IBM i5/OS, is a system that notifies you of attempts to hack into, disrupt, or deny service to the system. Prior to IDS, the i5/OS took some protective measures against the types of intrusions described here. However, with the new IDS support, the i5/OS system can now tell you about the intrusions. This IBM Redpaper describes the following types of intrusions on the i5/OS system that are caught, audited, and, in many cases, discarded—before they become a threat: Attacks - IP fragments - Malformed packets - SYN floods - Internet Control Message Protocol (ICMP) redirect messages - Perpetual echo - Restricted IP options - Restricted IP protocols Scans Traffic regulation anomalies for TCP and UDP
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.