Protocol scrubbing: network security through transparent flow modification
IEEE/ACM Transactions on Networking (TON)
Detecting evasion attacks at high speeds without reassembly
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 14th ACM conference on Computer and communications security
Hi-index | 0.00 |
This paper introduces a serious security problem that people believe has been fixed, but which is still very much existing and evolving, namely evasions. We describe how protocols can still be misused to fool network security devices, such as intrusion prevention systems.