FINDING · DEFENSE

An 'evasion' attack exploits the mirror condition: the IDS drops a TCP segment that the end-system accepts, due to differences in overlap-resolution policy. The IDS reconstructs 'ATTCK' while the end-system sees 'ATTACK'; the missing segment carries the content that would trigger the signature, leaving the censor with an incomplete—and non-matching—view of the stream.

From 1998-ptacek-insertionInsertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection · §4 · 1998

Implications

Tags

censors
generic
techniques
dpi
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.