🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Intrusion Detection

Focus Area: 🛡️ Security Operations & Defense
14
Total Entries
16
Contributors

Top Contributors

Sanket Karpe(2) Aneet Kumar Dutta(1) Ankur Tyagi(1) Bala Kumar S(1) Bhadreshkumar Patel(1)

All Entries (14 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2024-04-18Tool demoBlackhat eBPFShield: Unleashing the Power of eBPF for OS Kernel Exploitation and Security Source Code Sagar Bhure#blueteam#machine-learning#security-analytics+3
2022-12-07Tool demoBlackhat h0neytr4p - How to catch the external threat actors with an easy to configure Honeypot. Source Code Subhash Popuri#honeypot#ids#ips+3
2022-09-24TalkC0c0n Towards an Effective Intrusion Detection System Framework for Multi-Channel Man-in-the-Middle attacks Against Protected Wi-Fi Networks Manesh Thankappan#ids#network-monitoring#network-pentesting+3
2020-03-06TalkNullcon Automated Classification of Web-Application Attacks for Intrusion Detection Aneet Kumar Dutta#intrusion-detection#machine-learning#application-pentesting+3
2018-08-11Tool demoDefcon DejaVU—An Open Source Deception Framework Source Code Harish Ramadoss, Bhadreshkumar Patel#blueteam#network-defense#honeypot+4
2018-08-08Tool demoBlackhat ANWI (All New Wireless IDS): The $5 WIDS Source Code Rishikesh Bhide, Sanket Karpe#intrusion-detection#blueteam#wifi
2017-12-06Tool demoBlackhat ANWI (All New Wireless IDS) - The £5 WIDS Source Code Sanket Karpe#intrusion-detection#blueteam#wifi
2017-08-18TalkC0c0n 10 Things I Hate About Your Honeypots or How to Setup Honeypots That Work Rahul Binjve#honeypot#blueteam#network-monitoring+3
2015-08-08TalkDefcon Chigula — a framework for Wi-Fi Intrusion Detection and Forensics Video Vivek Ramachandran#wifi#intrusion-detection#forensics+1
2014-02-14TalkNullcon Flowinspect - A Network Inspection Tool Presentation Video Ankur Tyagi#security-assessment#malware-detection#network-monitoring+2
2011-10-07TalkC0c0n Network Security- Modern Mechanism for Intrusion Detection and avoidance in a P2P Network Bala Kumar S, Mohamed Emraanullah#blueteam#intrusion-detection#ids+3
2007-08-01TalkBlackhat PISA: Protocol Identification via Statistical Analysis Presentation Whitepaper Rohit Dhamankar, Rob King#blueteam#network-defense#intrusion-detection
2004-07-29TalkBlackhat Evasion and Detection of Web Application Attacks Presentation Whitepaper Video K K Mookhey#blueteam#intrusion-detection#application-pentesting+3