Disguising hacker attacks - history and morphology of advanced evasion techniques

Intrusion prevention systems (IPS) protect networks and systems against attacks and since the early days of IPS technology, hackers have tried to circumvent these systems. They slip malware into networks undetected, like a kind of invisibility cloak.

by Ash Patel

To access this content please sign in or register below for free

SIGN IN

Having trouble signing in?

Contact Customer Support at
scsupport@haymarket.com
or call 020 8267 8121

REGISTER NOW FOR FREE

REGISTRATION BENEFITS

  • Full access to feature, opinion and review content
  • The weekly SC Newswire bulletin
  • The Buyers' Guide of the latest products, and salary survey

Create an account now

Video and interviews

Interview - Everyone has an Achilles heel: The new security paradigm

How can we defend networks now that the perimeter has all but disappeared?
Brought to you in partnership with ExtraHop