Methodology of Network Intrusion Detection System Penetration Testing.

Hui Liu,Zhitang Li
DOI: https://doi.org/10.1109/waim.2008.69
2008-01-01
Abstract:Like a network camera, in the deployment of security equipments, IDS keeps the role of monitoring and analyzing the traffic in a timely manner. It strongly prevents the intrusive motivation by the way of recording every illegal access. Unfortunately, in the same time, hackers are trying their best to evade the IDS, in order to cover up their abnormal tracks. It is very important to let the IDS keep it's own safety, especially in the network deployment policy, in which IDS keeps an undivided part. From the aspect of vulnerability, this paper lists seven threats and submits the penetration test examples respectively. Also, the paper gives some useful advices in order to strengthen IDS safety.
What problem does this paper attempt to address?