| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Signature detection of attacks require an understanding of what is bad. Advanced attackers craft innovative and patient attacks that create a new brand of bad that has no signature. In this session, we will review how real-world breaches in 2013 were detected by looking at traffic deviating from normal patterns via metadata/NetFlow analysis.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast