UNIT-6 INTRUDERS
1. Explain the password selection strategies in detail? Compare their relative merits.
2. Explain the architecture of a distributed intrusion detection system. Give the major issues
in the design.
3. Briefly describe the three classes of intruder.
4. Briefly explain the UNIX password scheme. What are the threats to this scheme? How are
they overcome?
5. Write a note the following
a. Statistical anomaly based detection b. Rule based detection
c. Honeypots, d. Performance metrics.