会议专题

Methodology of Network Intrusion Detection System Penetration Testing

Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep it’s own safety, especially in the network deployment policy, in which IDS keeps an undivided part. From the aspect of vulnerability, this paper lists seven threats and submits the penetration test examples respectively. Also, the paper gives some useful advices in order to strengthen IDS safety.

Hui Liu Zhitang Li

Department of Computer Science & Technology,HuaZhong University of Science and Technology,Wuhan,Hubei,China

国际会议

The Ninth International Conference on Web-Age Information Management(第九届web时代信息管理国际会议)(WAIM 2008)

张家界

英文

2008-07-20(万方平台首次上网日期,不代表论文的发表时间)