Summary
This section highlights the key topics discussed in this chapter.
- The various methods used for traffic analysis using a network IPS sensor.
- The various evasion techniques used by attackers to bypass detection & filtering while understanding the benefits and limitations of each method to assess the risk of evasion.
- The various countermeasures, tools, and choosing the best approach based on the methods used by attackers.