Title :
Methodology of Network Intrusion Detection System Penetration Testing
Author :
Liu, Hui ; Li, Zhitang
Author_Institution :
Dept. of Comput. Sci. & Technol., HuaZhong Univ. of Sci. & Technol., Wuhan
Abstract :
Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep it´s own safety, especially in the network deployment policy, in which IDS keeps an undivided part. From the aspect of vulnerability, this paper lists seven threats and submits the penetration test examples respectively. Also, the paper gives some useful advices in order to strengthen IDS safety.
Keywords :
cameras; program testing; security of data; intrusive motivation; network camera; network deployment policy; network intrusion detection system penetration testing; security equipments; Computer hacking; Computer security; Computerized monitoring; Data security; Information security; Intrusion detection; Protection; Safety; System testing; Telecommunication traffic; intrusion detection; network security; penetration testing;
Conference_Titel :
Web-Age Information Management, 2008. WAIM '08. The Ninth International Conference on
Conference_Location :
Zhangjiajie Hunan
Print_ISBN :
978-0-7695-3185-4
Electronic_ISBN :
978-0-7695-3185-4
DOI :
10.1109/WAIM.2008.69