Intrusion detection evasion: How Attackers get past the burglar alarm

The purpose of this paper is to show methods that attackers can use to fool IDS systems into thinking their attack is legitimate traffic. With techniques like obfuscation, fragmentation, Denial of Service, and application hijacking the attacker can pass traffic under the nose of an IDS to prevent...
Corbin Carlo
December 13, 2003

All papers are copyrighted. No re-posting of papers is permitted