Please use this identifier to cite or link to this item:
|Title:||Evasion Techniques Efficiency over the IPS/IDS Technology||Authors:||Kılıç, H.
Katal, N. S.
Selçuk, Ali Aydın
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
|Issue Date:||Sep-2019||Publisher:||Institute of Electrical and Electronics Engineers Inc.||Source:||Kılıç, H., Katal, N. S. and Selçuk, A. A. (2019, September). Evasion Techniques Efficiency Over The IPS/IDS Technology. In 2019 4th International Conference on Computer Science and Engineering (UBMK) (pp. 542-547). IEEE.||Abstract:||Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment. This technology is made for capturing and preventing breaches and attacks. Evading of an IPS/IDS system creates a large gap in cyber-security. This research examines seven common evasion techniques and success rates of these over the IPS/IDS system. These techniques are TTL evasion, fragmentation with MTU modification evasion, tampering time - agent name and port name evasion, encoding and obfuscation evasion, bad checksum evasion, file header manipulation evasion, file and path change evasion. The last version of Snort IPS/IDS system was used to test attacks and evasion techniques. The whole attack and evasion dataset created by contemporary attack techniques during the research. Test results demonstrate that the IPS/IDS system can be bypassed with evasion techniques. © 2019 IEEE.||URI:||https://hdl.handle.net/20.500.11851/3856
|Appears in Collections:||Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering|
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Show full item record
checked on Sep 23, 2022
WEB OF SCIENCETM
checked on Feb 4, 2023
checked on Feb 6, 2023
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.