Circumventing an IPS/IDS

An attacker has an objective, and it is likely that he does not want to be stopped or seen. So, if you have IPS/IDS in place, an attacker may try to evade detection of his activities by the IPS/IDS. Table 17-6 describes evasion methods an attacker may try to use and Cisco options to counter these evasion techniques.

Image
Image
Image

Table 17-6 IPS/IDS Evasion Techniques

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset