Methodology of network intrusion detection system penetration testing

1Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep it's own safety, especially in the network deployment policy, in which IDS keeps an undivided part. From the aspect of vulnerability, this paper lists seven threats and submits the penetration test examples respectively. Also, the paper gives some useful advices in order to strengthen IDS safety. © 2008 IEEE.

Cite

CITATION STYLE

APA

Liu, H., & Li, Z. (2008). Methodology of network intrusion detection system penetration testing. In Proceedings - The 9th International Conference on Web-Age Information Management, WAIM 2008 (pp. 546–551). https://doi.org/10.1109/WAIM.2008.69

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free