UsefulLinks
Computer Science
Cybersecurity
Intrusion Detection Systems
1. Introduction to Intrusion Detection Systems
2. Fundamental Concepts and Terminology
3. IDS Classification by Deployment Location
4. IDS Classification by Detection Methodology
5. IDS Architecture and System Components
6. IDS Operational Workflow and Processes
7. IDS Management and Optimization
8. IDS Evasion and Counter-Evasion
9. Advanced IDS Technologies and Trends
10. IDS Selection and Implementation
11. IDS Testing and Validation
12. Legal and Compliance Considerations
8.
IDS Evasion and Counter-Evasion
8.1.
Common Evasion Techniques
8.1.1.
Traffic Encryption
8.1.1.1.
SSL/TLS Encryption
8.1.1.2.
VPN Tunneling
8.1.1.3.
Custom Encryption
8.1.2.
Packet Manipulation
8.1.2.1.
Fragmentation Attacks
8.1.2.2.
Overlapping Fragments
8.1.2.3.
Timing Attacks
8.1.3.
Payload Obfuscation
8.1.3.1.
Encoding Techniques
8.1.3.2.
Polymorphic Code
8.1.3.3.
Metamorphic Malware
8.1.4.
Protocol Manipulation
8.1.4.1.
Non-Standard Ports
8.1.4.2.
Protocol Violations
8.1.4.3.
Covert Channels
8.1.5.
Behavioral Evasion
8.1.5.1.
Low-and-Slow Attacks
8.1.5.2.
Mimicking Normal Traffic
8.1.5.3.
Distributed Attacks
8.2.
Counter-Evasion Strategies
8.2.1.
Traffic Analysis Enhancement
8.2.1.1.
SSL/TLS Inspection
8.2.1.2.
Deep Packet Inspection
8.2.1.3.
Metadata Analysis
8.2.2.
Advanced Detection Methods
8.2.2.1.
Behavioral Analysis
8.2.2.2.
Machine Learning Detection
8.2.2.3.
Heuristic Analysis
8.2.3.
System Hardening
8.2.3.1.
Sensor Protection
8.2.3.2.
Tamper Detection
8.2.3.3.
Secure Communications
8.3.
Evasion Testing and Validation
8.3.1.
Penetration Testing
8.3.2.
Red Team Exercises
8.3.3.
Evasion Tool Testing
8.3.4.
Detection Gap Analysis
Previous
7. IDS Management and Optimization
Go to top
Next
9. Advanced IDS Technologies and Trends