Skip to content

NIDS Evasion Strategies following the MITRE framework

License

Notifications You must be signed in to change notification settings

IMRO832000/NIDS-EVASION

Repository files navigation

This presentation discusses how to evade detection by network intrusion detection systems (NIDS) at each stage of the cyber kill chain. We provide a primer on Snort rules, which are commonly used NIDS rules, and identify potential indicators that might trigger alerts from NIDS. We also discuss evasion strategies that can be used to avoid detection.

About

NIDS Evasion Strategies following the MITRE framework

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published