Chapter 17. Beating the IDS

 

The B-2's stealth characteristics give it the unique ability to penetrate an enemy's most sophisticated defenses and threaten its most valued and heavily defended targets.

 
 --USAF fact sheet on the B-2 bomber

Introduction

In modern warfare, attacks occur in a very short period of time. The ability to thwart and repel an attack depends greatly on how early it can be detected. Radar, satellites, and other monitoring and surveillance systems are regularly used to detect any hostile activity. However, even in warfare, intrusion detection isn't 100% accurate. The Iraqis used cardboard mock-up models of Soviet T-72 tanks, which were detected by satellite photography and led the allied forces to think that they were real tanks. ...

Get Web Hacking: Attacks and Defense now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.