Intrusion Detection System Evasion Techniques - Protocol Violations

Protocol Violations

Some IDS evasion techniques involve deliberately violating the TCP or IP protocols in a way the target computer will handle differently than the IDS. For example, the TCP Urgent Pointer is handled differently on different operating systems and may not be handled correctly by the IDS.

Read more about this topic:  Intrusion Detection System Evasion Techniques

Famous quotes containing the word violations:

    There is no end to the violations committed by children on children, quietly talking alone.
    Elizabeth Bowen (1899–1973)