13.07.2015 Views

Chapter 11 Intrusion Detection System

Chapter 11 Intrusion Detection System

Chapter 11 Intrusion Detection System

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Detecting Attack Strings Scanning for a signature in each packet is not enough¡ attacker can split attack string into several packets, will defeatstateless NIDS Recording just previous packet’s text is not enough¡ attacker can send packets out of order Attacker can use TCP tricks so that certain packets areseen by NIDS but dropped by the receiving applicationSecurity Spring 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!