Playing Hide n' Seek with IDS

Author(s): Anton Tyurin
Alexey Lednyov
Category: Vulnerability Research
Duration: 45
Summary: Today all companies who are concerned about their security use IDS/IPS solutions. But do such systems really make hackers' life harder? In this talk we will try to find the answer considering the modern IDS/IPS bypass techniques. Also we will talk about how to hide your network presence and what malware does to disguise its network activity. This talk is intended to show that the only IDS/IPS is not enough to secure your infrastructure. Audience will learn about the weaknesses that developers leave in their systems, as well as the examples of how to leave no trace on the network.

Likes: 0

Comments

jetplow

"This talk is intended to show that the only IDS/IPS is not enough to secure your infrastructure". Thank you for putting up the conclusion here