Different operating systems apply different precedence rules when TCP segments overlap—some implementations use 'first data wins,' others 'last data wins.' An IDS applying a single universal reassembly policy will systematically diverge from the actual target end-system whenever overlapping segments appear, creating a predictable and repeatable evasion surface that is an inherent consequence of policy misalignment rather than a configuration flaw.
From 1998-ptacek-insertion — Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
· §4
· 1998
Implications
Determine the censor's TCP overlap policy by probing with overlapping segments to a controlled endpoint, then craft overlap sequences that match the destination OS's reassembly while diverging from the censor's.
Build a lookup table of per-OS TCP reassembly behaviors to automate evasion strategy selection; when a censor upgrades to emulate one OS, rotate to a strategy targeting a different OS.