Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/3856
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kılıç, H. | - |
dc.contributor.author | Katal, N. S. | - |
dc.contributor.author | Selçuk, Ali Aydın | - |
dc.date.accessioned | 2020-10-22T16:40:35Z | - |
dc.date.available | 2020-10-22T16:40:35Z | - |
dc.date.issued | 2019-09 | |
dc.identifier.citation | Kılıç, H., Katal, N. S. and Selçuk, A. A. (2019, September). Evasion Techniques Efficiency Over The IPS/IDS Technology. In 2019 4th International Conference on Computer Science and Engineering (UBMK) (pp. 542-547). IEEE. | en_US |
dc.identifier.isbn | 978-172813964-8 | |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/3856 | - |
dc.identifier.uri | https://ieeexplore.ieee.org/document/8907177 | - |
dc.description.abstract | Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment. This technology is made for capturing and preventing breaches and attacks. Evading of an IPS/IDS system creates a large gap in cyber-security. This research examines seven common evasion techniques and success rates of these over the IPS/IDS system. These techniques are TTL evasion, fragmentation with MTU modification evasion, tampering time - agent name and port name evasion, encoding and obfuscation evasion, bad checksum evasion, file header manipulation evasion, file and path change evasion. The last version of Snort IPS/IDS system was used to test attacks and evasion techniques. The whole attack and evasion dataset created by contemporary attack techniques during the research. Test results demonstrate that the IPS/IDS system can be bypassed with evasion techniques. © 2019 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.relation.ispartof | 4th International Conference on Computer Science and Engineering | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Evasion attacks-technique | en_US |
dc.subject | Intrusion Detection Systems (IDS) | en_US |
dc.subject | Intrusion Prevention Systems (IPS) | en_US |
dc.title | Evasion Techniques Efficiency Over the Ips/Ids Technology | en_US |
dc.type | Conference Object | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.startpage | 542 | |
dc.identifier.endpage | 547 | |
dc.authorid | 0000-0002-8963-1647 | - |
dc.identifier.wos | WOS:000609879900103 | en_US |
dc.identifier.scopus | 2-s2.0-85076199237 | en_US |
dc.institutionauthor | Selçuk, Ali Aydın | - |
dc.identifier.doi | 10.1109/UBMK.2019.8907177 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
item.openairetype | Conference Object | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
2
checked on Dec 21, 2024
WEB OF SCIENCETM
Citations
8
checked on Nov 9, 2024
Page view(s)
112
checked on Dec 23, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.