
In this paper I take a look at how malware attempts to evade detection by both network-based and host-based intrusion detection systems through some very clever techniques. All of the malware featured was captured by my own personal honeypots.
Please view or download the paper over at Scribd:
Tricks of the Trade - How Malware Authors Cover Their Tracks
No comments:
Post a Comment