Intrusion detection system evasion techniques: Difference between revisions

Content deleted Content added
remove proxy url that duplicates doi
endmatter formatting
Line 54:
 
== References ==
{{reflist}}
<references/>
 
== External links ==
#* [http://www.virusbtn.com/virusbulletin/archive/2010/04/vb201004-evasions-in-IPS-IDS Evasions in IDS/IPS], Abhishek Singh, Virus Bulletin, April 2010.
#* [http://citeseer.ist.psu.edu/ptacek98insertion.html Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection] Thomas Ptacek, Timothy Newsham. Technical Report, Secure Networks, Inc., January 1998.
#* [http://www.securityfocus.com/infocus/1232 IDS evasion with Unicode] Eric Packer. last updated January 3, 2001.
#* [http://monkey.org/~dugsong/fragroute/ Fragroute home page]
#* [http://www.freshports.org/security/fragrouter Fragrouter source code]
#* [http://www.cirt.net/code/nikto.shtml Nikto home page] outdated, see : https://cirt.net/nikto2
#* [http://www.phrack.org/archives/57/p57-0x03 Phrack 57 phile 0x03] mentioning the TCP Urgent pointer
#* [http://www.wiretrip.net/rfp/ Whisker home page]
#* [http://www.syhunt.com/sandcat Sandcat home page]
#* [http://www.snort.org/docs/faq/1Q05/node47.html#stream4 Snort's stream4 preprocessor] for stateful packet reassembly
 
[[Category:Computer security]]