Chapter 11 Intrusion Detection System
Chapter 11 Intrusion Detection System
Chapter 11 Intrusion Detection System
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Detecting Attack Strings Scanning for a signature in each packet is not enough¡ attacker can split attack string into several packets, will defeatstateless NIDS Recording just previous packet’s text is not enough¡ attacker can send packets out of order Attacker can use TCP tricks so that certain packets areseen by NIDS but dropped by the receiving applicationSecurity Spring 2013