Ask the Expert

How hackers attack undetected

How can a hacker get into a network without being detected?

    Requires Free Membership to View

Hackers enter networks undetected in many different ways. Organizations often spend a lot of time and effort guarding against outside attackers while insiders may pose a bigger risk. If IDSes and controls focus on outsiders, insiders may be able to exceed their access level and remain undetected. Even if an attack originates from the outside, it may go unnoticed. Many security administrators are so overworked they may not be able to perform an in-depth analysis of their IDS logs. If the IDS isn't properly tuned, false-positives can occur and security administrators may miss an actual hacking attempt. An example of this is the PBS report concerning Moonlight Maze. These hacks and probes of computer systems at the Pentagon, NASA, Energy Department, private universities and research labs began in March 1998 and had been going on for nearly two years before being discovered.

More Information

  • Test your knowledge of intrusion detection and prevention systems with this quiz.

  • Attend this on-demand webcast and learn how to use IDS and IPS effectively.

  • Learn what some are doing to reduce the number of false positives in IDSes.

  • This was first published in September 2005

    There are Comments. Add yours.

    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: