Intrusion Detection System Evasion Techniques - Protocol Violations

Protocol Violations

Some IDS evasion techniques involve deliberately violating the TCP or IP protocols in a way the target computer will handle differently than the IDS. For example, the TCP Urgent Pointer is handled differently on different operating systems and may not be handled correctly by the IDS.

Read more about this topic:  Intrusion Detection System Evasion Techniques

Famous quotes containing the word violations:

    The peace loving nations must make a concerted effort in opposition to those violations of treaties and those ignorings of humane instincts which today are creating a state of international anarchy and instability from which there is no escape through mere isolation or neutrality.... When an epidemic of physical disease starts to spread, the community approves and joins in a quarantine of the patients in order to protect the health of the community against the spread of the disease.
    Franklin D. Roosevelt (1882–1945)