主页 / 中国网络安全大会 2016 / IBM X-Force如何抵御未知威胁
  • 作者
    李承达@IBM
  • 简介
    • What is PAM?
    • PAM does more with less
    • PAM parses each frame, layer by layer
    • PAM Parser Overview
    • PAM Protocol Heuristics (layer 5)
    • Example of Deep Packet Inspection (1 of 5)
    • Ahead of the Threat (AOTT)
    • X-Force Top 100 Ahead of the Threat Coverage
    • AOTT coverage with MOV_Container_Overflow
    • AOTT coverage with Script_DOM_Unconditional_Undo
    • AOTT coverage with Zip_Directory_Traversal
    • AOTT coverage with Script_Array_Overflow
    • Pattern Matching vs. Deep Packet Inspection
    • Advantages: Pattern Matching vs. Deep Packet Inspection
    • X-Force Top 100 Ahead of the Threat Coverage
    • Pattern Matching: False Negative
    • Pattern Matching: A rule for each exploit
    • 2016 IBM Corporation 25
    • Pattern Matching: Lack of Coverage
    • Pattern Matching: Large Rule Set
    • Powered by PAM provides broad threat coverage
    • IBM X-Force monitors and analyzes the changing threat landscape
    • IBM X-Force® Exchange
  • 援引
    http://www.skdlabs.com/bbs/forum.php?mod=viewthread&tid=108&extra=page%3D1
  • 提示
    本站仅做资料的整理和索引,转载引用请注明出处
附件下载
  • 李承达:IBM.X.Force如何抵御未知威胁.pdf
    时间: 大小: 0.82 M 下载: 32