diff --git a/PhD/seminar/images/hids_falcon.png b/PhD/seminar/images/hids_falcon.png new file mode 100644 index 0000000..e5b210b Binary files /dev/null and b/PhD/seminar/images/hids_falcon.png differ diff --git a/PhD/seminar/images/hids_list.svg b/PhD/seminar/images/hids_list.svg new file mode 100644 index 0000000..e22fae7 --- /dev/null +++ b/PhD/seminar/images/hids_list.svg @@ -0,0 +1,157 @@ + + + + diff --git a/PhD/seminar/images/hids_malwarebyte.png b/PhD/seminar/images/hids_malwarebyte.png new file mode 100644 index 0000000..bd46a62 Binary files /dev/null and b/PhD/seminar/images/hids_malwarebyte.png differ diff --git a/PhD/seminar/images/hids_redscan.png b/PhD/seminar/images/hids_redscan.png new file mode 100644 index 0000000..9e7c92d Binary files /dev/null and b/PhD/seminar/images/hids_redscan.png differ diff --git a/PhD/seminar/images/hids_windows.png b/PhD/seminar/images/hids_windows.png new file mode 100644 index 0000000..64ed322 Binary files /dev/null and b/PhD/seminar/images/hids_windows.png differ diff --git a/PhD/seminar/seminar.typ b/PhD/seminar/seminar.typ index 3a34a76..67c57b7 100644 --- a/PhD/seminar/seminar.typ +++ b/PhD/seminar/seminar.typ @@ -21,6 +21,10 @@ #slide(title: "State of the IDS")[ // Most IDS rely on host-based information // Process List is a very common default info to verify +#only(1)[#align(center)[#image("images/hids_redscan.png", width:100%)]] +#only(2)[#align(center)[#image("images/hids_malwarebyte.png", width:100%)]] +#only(3)[#align(center)[#image("images/hids_windows.png", width:100%)]] +#only(4)[#align(center)[#image("images/hids_falcon.png", width:100%)]] ] #slide(title:"State of the IDS")[ // Process masquerading is trivialy posible and used by many attacks (Mitre AttCK list)