O'Reilly logo

CEH® Certified Ethical Hacker Study Guide by Kimberly Graves

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

CEH EXAM OBJECTIVES COVERED IN THIS CHAPTER:

  • List the types of intrusion detection systems and evasion techniques

  • List firewall types and honeypot evasion techniques

Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls

Types of IDSs and Evasion Techniques

Intrusion detection systems (IDSs) inspect traffic and look for known signatures of attacks or unusual behavior patterns. A packet sniffer views and monitors traffic and is a built-in component of an IDS. An IDS alerts a command center or system administrator by pager, email, or cell phone when an event appearing on the company's security event list is triggered. Intrusion ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required