Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion

Document Type

Article

Publication Date

11-2006

Publication Source

IEEE Security and Privacy

Abstract

In this article, the authors describe common intrusion detection techniques, NIDS evasion methods, and how NIDSs detect intrusions. Additionally, we introduce new evasion methods, present test results for confirming attack outcomes based on server responses, and propose a methodology for confirming response validity.

Inclusive pages

36-43

ISBN/ISSN

1540-7993

Comments

© 2006 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Permission documentation on file.

Publisher

Institute of Electrical and Electronics Engineers

Place of Publication

Piscataway, NJ

Volume

4

Peer Reviewed

yes

Issue

6

Link to published version

Share

COinS