If an attacker knew a network-based ids like snort was


If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to evade detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker, and suggest a remedy or defense against the techniques you cite.

Additional information

The problem related to Computer Science and it explains about how an attacker who knows a tool like Snort is running and how does he try to evade detection with examples.

Word limit: 125

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: If an attacker knew a network-based ids like snort was
Reference No:- TGS01182682

Now Priced at $10 (50% Discount)

Recommended (90%)

Rated (4.3/5)