Technical Track
This paper examines two key aspects of network defense: the ability to circumvent detection devices and how network analysts respond to evasion techniques. We examine how social engineering can be used to influence an analyst's decisions and we recommend ways to counter this threat. The intended audience will be responsible for either developing IDS signatures, or analyzing network IDS results. The technical detail is moderate, but does assume some exposure to network traffic analysis, intrusion detection, and exploits in general.
http://www.first.org/conference/2006/papers/chaboya-david-slides.pdf
Type: Slides
Format: application/pdf
Last updated: May 18, 2006
Size: 1.88 Mb
http://www.first.org/conference/2006/papers/chaboya-david-slides.pdf
Type: Slides
Format: application/pdf
Last updated: July 12, 2006
Size: 1.88 Mb
http://www.first.org/conference/2006/papers/chaboya-david-papers.pdf
Type: Paper
Format: application/pdf
Last updated: July 12, 2006
Size: 232 Kb
Authors & presenters
Barry Mullins (AFCERT Air Force Institute of Technology, US) David Chaboya (AFCERT Air Force Institute of Technology, US) Richard Raines (AFCERT Air Force Institute of Technology, US) Rusty Baldwin (AFCERT Air Force Institute of Technology, US)