How an attacker who knows a tool like snort is running

Assignment Help Basic Computer Science
Reference no: EM13889433 , Length: word count:125

If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to evade detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker, and suggest a remedy or defense against the techniques you cite.

Additional information

The problem related to Computer Science and it explains about how an attacker who knows a tool like Snort is running and how does he try to evade detection with examples.

Word limit: 125

Reference no: EM13889433

Questions Cloud

Describe how host-based intrusion detection works : Describe how host-based intrusion detection works, briefly contrasting it with network-based intrusion detection. Explain three types of threats against which HIDS is particularly effective.
Use contemporary case tools in process and data modeling : Use contemporary CASE tools in process and data modeling
Identify a cost driver that would serve as a valid measure : For each of the activities listed in (a), identify a cost driver that would serve as a valid measure of the resources consumed by the activity.
Design logic for the control unit : Design Logic for the control unit
How an attacker who knows a tool like snort is running : If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to evade detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker, and suggest a remed..
Determine the amount of overhead that should be assigned : Another method of allocating overhead is to use direct labor dollars as an allocation basis. Then, determine the amount of overhead that should be assigned to each unit of each product line using this method.
Manage copper price risk-effective annual interest rate : ABC Corp. mines copper, with ?xed costs of $0.60/lb and variable cost of $0.30/lb. The 1-year forward price of copper is $1.10/lb. The 1-year effective annual interest rate is 6.2%. If ABC Corp. does nothing to manage copper price risk, what is its p..
West gorham high school is to be located at the population : 1.West Gorham High School is to be located at the population center of gravity of three communities:
Define two primary approaches in developing signatures : Identify and briefly describe the two primary approaches to developing signatures for network-based IDS tools. Is one technique preferred over the other? Explain why.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Suggest a way to find web servers for the department

Can you suggest a way to roughly find out the web servers (outside your department) which are not popular among the users in the department? Describe.

  Evaluate events that could delay the closing of a project

Identify events that could delay the closing of a project or phase. Evaluate which event you believe would cause the longest delay and explain why. Provide an example to justify your answer

  What is transfer rate in bytes per second

What is the transfer rate, in bytes per second, required to move the pixels from video memory to the screen for the "true color" image?

  Possibilities curve between health and all other goods

Draw a production possibilities curve between health and all other goods

  Alice and bob are experimenting with csma using walsh table.

Alice and Bob are experimenting with CSMA using walsh table. Alice uses the code[+1,+1] and Bob uses the code[+1,-1]. Assume that they simultaneously send a hexadecimal digit to each other.

  What other major discoveries in cosmology have relied

Some advances in our knowledge have been made possible through better equipment, such as Hubble's discoveries using the 100-inch Hooker telescope at Mount Wilson. What other major discoveries in cosmology have relied on improvements in existing ap..

  Define a class for complex number

Define a class for complex numbers. A complex number is a number of the form a + b*i where for our purposes, a and b are numbers of type double, and i is a number that represents the quantity sqrt(-1).

  Operations of information security

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it ..

  Is it ethical for a potential employer to use the internet

Digital Footprint , is it ethical for a potential employer to use the internet this way? Also is it legal?

  A program to simulate a cash register change calculator

Write a program to simulate a cash register change calculator. Assume that you have two double variables that have been declared and initialized with some values: cost and amtPaid. Assume that amtPaid is greater than or equal to cost.

  What are base stations in wireless networking

What are base stations in wireless networking? What IEEE standards are used for wireless networking?

  Submit a java program comprising two source files

Submit a Java program comprising two source files: MyArrayList.java, defining a generic MyArrayList class representing "stretchy" arrays. This class is to mimic some features of the built-in ArrayList generic collection class .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd