FINDING · DEFENSE

IP-level fragment overlap attacks operate independently of TCP: crafting overlapping IP fragments whose reassembly by the IDS yields benign content while the end-system's reassembly yields the true payload. The paper demonstrates this is a separate attack surface from TCP-level evasion, exploitable below the transport layer before any TCP stream reconstruction begins.

From 1998-ptacek-insertionInsertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection · §3 · 1998

Implications

Tags

censors
generic
techniques
dpimiddlebox-interference
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.