An overview of network evasion methods

  • Authors:
  • Brian Hernacki;Jeremy Bennett;James Hoagland

  • Affiliations:
  • Symantec Corporation, 1600 Seaport Boulevard #200, Redwood City, CA 94063, 650-381-8000, USA;Symantec Corporation, 1600 Seaport Boulevard #200, Redwood City, CA 94063, 650-381-8000, USA;Symantec Corporation, 1600 Seaport Boulevard #200, Redwood City, CA 94063, 650-381-8000, USA

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In recent years much attention has been paid in the network security space to a variety of issues including performance and detection capability. Resistance to evasion however has not been pursued with the same level of interest. During this time many of the technologies have evolved. New applications, protocols and services abound and even the security devices themselves have also become more complex. This lack of focus combined with significant change presents new risks. This paper provides an overview of evasion techniques both new and old, and considers them relative to current technologies.