This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion
November/December 2006 (vol. 4 no. 6)
pp. 36-43
David J. Chaboya, US Air Force Institute of Technology
Richard A. Raines, US Air Force Institute of Technology
Rusty O. Baldwin, US Air Force Institute of Technology
Barry E. Mullins, US Air Force Institute of Technology
In this article, the authors describe common intrusion detection techniques, NIDS evasion methods, and how NIDSs detect intrusions. Additionally, we introduce new evasion methods, present test results for confirming attack outcomes based on server responses, and propose a methodology for confirming response validity.
Index Terms:
intrusion detection, NIDS, network forensics, evasion techniques, polymorphic shellcode
Citation:
David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, "Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion," IEEE Security & Privacy, vol. 4, no. 6, pp. 36-43, Nov.-Dec. 2006, doi:10.1109/MSP.2006.159
Usage of this product signifies your acceptance of the Terms of Use.