Computer Security
[EN] securityvulns.ru no-pyccku


Using timing attacks to bypass intrusion detection
Published:02.02.2006
Source:
SecurityVulns ID:5725
Type:remote
Threat Level:
6/10
Description:It's possible to use difference in timing, for example packet reasembly timeouts, of target system and IDS to bypass detection. As workaround, timing parameters of IDS should be configured to match timing parameters of protected system.
Original documentdocumentanonpoetin_(at)_connu.isu.edu, Verified evasion in Snort (02.02.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod