主页 / 中国网络安全大会 2016 / IBM X-Force如何抵御未知威胁

-
作者李承达@IBM
-
简介
- What is PAM?
- PAM does more with less
- PAM parses each frame, layer by layer
- PAM Parser Overview
- PAM Protocol Heuristics (layer 5)
- Example of Deep Packet Inspection (1 of 5)
- Ahead of the Threat (AOTT)
- X-Force Top 100 Ahead of the Threat Coverage
- AOTT coverage with MOV_Container_Overflow
- AOTT coverage with Script_DOM_Unconditional_Undo
- AOTT coverage with Zip_Directory_Traversal
- AOTT coverage with Script_Array_Overflow
- Pattern Matching vs. Deep Packet Inspection
- Advantages: Pattern Matching vs. Deep Packet Inspection
- X-Force Top 100 Ahead of the Threat Coverage
- Pattern Matching: False Negative
- Pattern Matching: A rule for each exploit
- 2016 IBM Corporation 25
- Pattern Matching: Lack of Coverage
- Pattern Matching: Large Rule Set
- Powered by PAM provides broad threat coverage
- IBM X-Force monitors and analyzes the changing threat landscape
- IBM X-Force® Exchange
-
援引http://www.skdlabs.com/bbs/forum.php?mod=viewthread&tid=108&extra=page%3D1
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2020-08-23 14:37:57.452875
-
2019-09-02 07:10:16
-
2016-04-24 02:46:18
-
2017-11-25 04:05:34
附件下载
-
李承达:IBM.X.Force如何抵御未知威胁.pdf