Please use this identifier to cite or link to this item:
Title: Evasion Techniques Efficiency over the IPS/IDS Technology
Authors: Kılıç, H.
Katal, N. S.
Selçuk, Ali Aydın
Keywords: Evasion attacks-technique
Intrusion Detection Systems (IDS)
Intrusion Prevention Systems (IPS)
Issue Date: Sep-2019
Publisher: Institute of Electrical and Electronics Engineers Inc.
Source: Kılıç, H., Katal, N. S. and Selçuk, A. A. (2019, September). Evasion Techniques Efficiency Over The IPS/IDS Technology. In 2019 4th International Conference on Computer Science and Engineering (UBMK) (pp. 542-547). IEEE.
Abstract: Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment. This technology is made for capturing and preventing breaches and attacks. Evading of an IPS/IDS system creates a large gap in cyber-security. This research examines seven common evasion techniques and success rates of these over the IPS/IDS system. These techniques are TTL evasion, fragmentation with MTU modification evasion, tampering time - agent name and port name evasion, encoding and obfuscation evasion, bad checksum evasion, file header manipulation evasion, file and path change evasion. The last version of Snort IPS/IDS system was used to test attacks and evasion techniques. The whole attack and evasion dataset created by contemporary attack techniques during the research. Test results demonstrate that the IPS/IDS system can be bypassed with evasion techniques. © 2019 IEEE.
ISBN: 978-172813964-8
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection

Show full item record

CORE Recommender


checked on Sep 23, 2022


checked on Feb 4, 2023

Page view(s)

checked on Feb 6, 2023

Google ScholarTM



Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.