【24h】

Methodology of Network Intrusion Detection System Penetration Testing

机译:网络入侵检测系统渗透测试方法

获取原文

摘要

Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep it’s own safety, especially in the network deployment policy, in which IDS keeps an undivided part. From the aspect of vulnerability, this paper lists seven threats and submits the penetration test examples respectively. Also, the paper gives some useful advices in order to strengthen IDS safety.
机译:就像网络摄像机一样,在部署安全设备时,IDS扮演着及时监视和分析流量的角色。它通过记录每个非法访问的方式来强烈防止侵入动机。不幸的是,与此同时,黑客正竭尽所能逃避IDS,以掩盖其异常行为。让IDS保持自身的安全非常重要,尤其是在IDS保持独立的网络部署策略中。从漏洞的角度,本文列出了七个威胁并分别提交了渗透测试示例。此外,本文还提供了一些有用的建议,以增强IDS的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号