Abstract
You pick up almost any software, and it communicates over the network for one reason or the other. Even something like software updates happens over the network and is a form of network communication. The same applies to malware, as we have covered in Chapter 9. The use of network communication for malicious activity extends to a timeline that precedes command-and-control (CnC) communication by the malware. Even before the malware file is delivered to the victim, you might have an exploit delivered to the victim, multiple malicious exchanges before the final malware payload file is transferred over the network. Similarly, you can also have emails carrying malicious attachments. All use the network for its communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Abhijit Mohanta, Anoop Saldanha
About this chapter
Cite this chapter
Mohanta, A., Saldanha, A. (2020). IDS/IPS and Snort/Suricata Rule Writing. In: Malware Analysis and Detection Engineering. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-6193-4_23
Download citation
DOI: https://doi.org/10.1007/978-1-4842-6193-4_23
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-6192-7
Online ISBN: 978-1-4842-6193-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books