Question: 4. If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to penetrate the network
4. If an attacker knew a network-based IDS like Snort was running in a targeted environment, how might the attacker try to penetrate the network while avoiding detection? Provide at least two examples of IDS evasion techniques that might be used by an attacker and suggest a remedy or defense against the techniques you cite.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
