主页 / 中国网络安全大会 2016 / IBM X-Force如何抵御未知威胁
-
作者李承达@IBM
-
简介
- What is PAM?
- PAM does more with less
- PAM parses each frame, layer by layer
- PAM Parser Overview
- PAM Protocol Heuristics (layer 5)
- Example of Deep Packet Inspection (1 of 5)
- Ahead of the Threat (AOTT)
- X-Force Top 100 Ahead of the Threat Coverage
- AOTT coverage with MOV_Container_Overflow
- AOTT coverage with Script_DOM_Unconditional_Undo
- AOTT coverage with Zip_Directory_Traversal
- AOTT coverage with Script_Array_Overflow
- Pattern Matching vs. Deep Packet Inspection
- Advantages: Pattern Matching vs. Deep Packet Inspection
- X-Force Top 100 Ahead of the Threat Coverage
- Pattern Matching: False Negative
- Pattern Matching: A rule for each exploit
- 2016 IBM Corporation 25
- Pattern Matching: Lack of Coverage
- Pattern Matching: Large Rule Set
- Powered by PAM provides broad threat coverage
- IBM X-Force monitors and analyzes the changing threat landscape
- IBM X-Force® Exchange
-
援引http://www.skdlabs.com/bbs/forum.php?mod=viewthread&tid=108&extra=page%3D1
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-02-26 15:46:53
-
2016-02-25 06:12:24
-
2019-12-07 10:58:42
-
2018-09-01 03:38:02
附件下载
-
李承达:IBM.X.Force如何抵御未知威胁.pdf