Network Intrusion Detection of Third Party Effects

Cyber Chief Magazine brings you the tactics to uncover and neutralize the insider threat

The main goal of this paper is to familiarize the reader with reactions and responses from innocent victims, who may be subject to reconnaissance or denial of service. If a perpetrator spoofs your address space you may see unsolicited traffic from an innocent second party.

Download the paper in PDF format here.