Probabilistic Alert Correlation
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Testing network-based intrusion detection signatures using mutant exploits
Proceedings of the 11th ACM conference on Computer and communications security
Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Performance adaptation in real-time intrusion detection systems
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Information fusion for computer security: State of the art and open issues
Information Fusion
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
Hi-index | 0.00 |
In recent years much attention has been paid in the network security space to a variety of issues including performance and detection capability. Resistance to evasion however has not been pursued with the same level of interest. During this time many of the technologies have evolved. New applications, protocols and services abound and even the security devices themselves have also become more complex. This lack of focus combined with significant change presents new risks. This paper provides an overview of evasion techniques both new and old, and considers them relative to current technologies.