Talk With an Expert

Assumptions in Intrusion Detection - Blind Spots in Analysis

Assumptions in Intrusion Detection - Blind Spots in Analysis (PDF, 2.14MB)Published: 28 Mar, 2007
Created by:
Rodney Caudle

This paper examines one of the common assumptions made as an intrusion analyst looking at network packet captures and explores the possible avenues which could determine that the assumption may not be as trustworthy as has been previously assumed. This paper attempts to guide the analyst by providing a detailed analysis of the TCP/IP standards stack with particular focus on the communication that exists between layers of the stack. As will be shown in this paper, the communication, or lack of communication, provide the possibility of exploitation at various levels as data passes between layers in the standards stack