A case study/research paper providing detailed analysis of several anomalous network events to illustrate the techniques for examining alerts and logs generated by a network intrusion detection system.
Article examining the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents currently being developed on the Internet.
This report, written as a case study, presents results of a detailed information security audit of UNIX systems that belong to a fictitious company. It illustrates an approach to performing such an examination.