Evading NIDS, revisited
In this article we look at some of the most popular IDS evasion attack techniques. We start by looking at attacks that are based on fragmentation, which includes attacks based on different fragment reassembly timeouts of different operating systems.
By Sumit Siddharth at SecurityFocus.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.