Talk With an Expert

Deception Techniques as Part of Intrusion Detection Strategy

Deception Techniques as Part of Intrusion Detection Strategy (PDF, 2.28MB)Published: 01 Aug, 2016
Created by:
Colm Kennedy

Intrusion Detection Systems (IDS) are used to help the Security Analyst detect unauthorized or suspicious activity inside a network and on Endpoints (servers, workstations). An early stage in the Hackers methodology uses Active Recon on the network to find other machines they can pivot to and maintain their presence.