On Sun, 10 Dec 2006, [EMAIL PROTECTED] wrote:

I am interested in knowing evasion schemes for application based invasions available, and i appreciate if you can guide me to some papers or links where I can find such information, and where to look for answers about evasion techniques, many thanks,

ptacek and newsham, "insertion, evasion, and denial of service: Eluding. Network Intrusion Detection" and anything that cites that. names to look for include vern paxson, roesch, Lippmann, and many others. simply looking for that paper in google scholar yields dozens of citations and extensions.

fan out from that, fan backwards from that, and you'll learn a great deal. it's one of the best starting points in this question.

________
jose nazario, ph.d.                 [EMAIL PROTECTED]
http://monkey.org/~jose/            http://monkey.org/~jose/secnews.html
                                    http://www.wormblog.com/

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more.
------------------------------------------------------------------------

Reply via email to