This article is a response to Rik Farrow's question about the LOpht's work on intrusion-detection packages for Network Flight Recorder. In particular we asked how we chose which packets to look at. So I shall to attempt to give a brief overview of how a group of hackers - and I use the term in the good sense- goes round approaching Network intrusion detection, given the current state of tools and enviroments.
© 2001-2024 Fundación Dialnet · Todos los derechos reservados