Intrusion detection system evasion techniques: Difference between revisions

Content deleted Content added
Reverted vandalism by 1.10.252.98
Line 3:
Most IDSs have been modified to detect or even reverse basic evasion techniques, but IDS evasion (and countering IDS evasion) are still active fields.
 
==Obfuscation==
==Payload obfuscation==
An IDS can be evaded by obfuscating or encoding the attack payload in a way that the target computer will reverse but the IDS will not. In this way, an attacker can exploit the end host without alerting the IDS.