One of the key countermeasures against network compromise is an intrusion
detection system (IDS). A well-configured IDS is a critical element in
information system security. Given ample time to probe defenses and find holes
in a system, a hacker will find a way to compromise the network, even against
the best perimeter defenses. Therefore, no security posture is complete without
a way to detect and respond to hacker activity. This is what an IDS offers.
In this chapter, we offer techniques for evading an IDS during penetration testing and explain when they should be used. Based on these techniques, we present a few leading practices for properly configuring an IDS to detect intrusion attempts. Further, we briefly present information on common IDSs currently available.
In this chapter, we offer techniques for evading an IDS during penetration testing and explain when they should be used. Based on these techniques, we present a few leading practices for properly configuring an IDS to detect intrusion attempts. Further, we briefly present information on common IDSs currently available.
Comments
Post a Comment