Intrusion detection system evasion techniques: Difference between revisions

Content deleted Content added
Added a link to a blog post presenting some research done regarding evasions.
rm repeated link
Line 30:
 
=== Protocol ambiguities ===
Some IDS evasion techniques involve deliberately manipulating [[Transmission Control Protocol|TCP]] or [[Internet Protocol|IP]] protocols in a way the target computer will handle differently from the IDS. For example, the [[Transmission Control Protocol|TCP Urgenturgent Pointer]]pointer is handled differently on different operating systems. If the IDS doesn't handle these protocol violations in a manner consistent with its end hosts, it is vulnerable to insertion and evasion techniques similar to those mentioned earlier.<ref name=":04" />
 
=== Low-bandwidth attacks ===