Protocol Violations
Some IDS evasion techniques involve deliberately violating the TCP or IP protocols in a way the target computer will handle differently than the IDS. For example, the TCP Urgent Pointer is handled differently on different operating systems and may not be handled correctly by the IDS.
Read more about this topic: Intrusion Detection System Evasion Techniques
Famous quotes containing the word violations:
“There is no end to the violations committed by children on children, quietly talking alone.”
—Elizabeth Bowen (18991973)
Related Phrases
Related Words