National Repository of Grey Literature 12 records found  previous11 - 12  jump to record: Search took 0.01 seconds. 
Eluding and Evasion of IDS Systems
Černý, Marek ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
This paper analyzes network security devices called intrusion detection (ID) systems. In order to point out possible flaws, especially ID systems using signature analysis are examined. Based on this, methods to exploit possible vulnerabilities of these systems were designed. These methods were implemented into a simple program for ID systems efficiency evaluation. It can be used in a way entirely independent of particular network attack used in the test.
Network security monitor
Morský, Ondřej ; Hošek, Jiří (referee) ; Pelka, Tomáš (advisor)
This document describes software for network traffic analysis a network security monitoring. The way of processing captured frames in network cards and in protocol drivers is also described here. Second part attends to function of packet capture and network communication analysis software which can also generate traffic. This application is designed for Windows operating systems and is created as modular and easily extensible using DLL libraries. Source code of this application can be found on appended CD.

National Repository of Grey Literature : 12 records found   previous11 - 12  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.