How hackers attack undetected

Learn how hackers can attack a network and remain undetected.

How can a hacker get into a network without being detected?

Hackers enter networks undetected in many different ways. Organizations often spend a lot of time and effort guarding...

against outside attackers while insiders may pose a bigger risk. If IDSes and controls focus on outsiders, insiders may be able to exceed their access level and remain undetected. Even if an attack originates from the outside, it may go unnoticed. Many security administrators are so overworked they may not be able to perform an in-depth analysis of their IDS logs. If the IDS isn't properly tuned, false-positives can occur and security administrators may miss an actual hacking attempt. An example of this is the PBS report concerning Moonlight Maze. These hacks and probes of computer systems at the Pentagon, NASA, Energy Department, private universities and research labs began in March 1998 and had been going on for nearly two years before being discovered.

More Information

  • Test your knowledge of intrusion detection and prevention systems with this quiz.

  • Attend this on-demand webcast and learn how to use IDS and IPS effectively.

  • Learn what some are doing to reduce the number of false positives in IDSes.

  • This was first published in September 2005

    Dig Deeper on Network Intrusion Detection (IDS)



    Find more PRO+ content and other member only offers, here.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.



    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: