FINDING · DEFENSE

An 'insertion' attack sends TCP segments with forged TTL values low enough to expire at the IDS/censor but not at the true destination. The IDS incorporates the spurious segment into its reconstructed stream—seeing 'ATXTACK'—while the end-system assembles the intended byte stream 'ATTACK,' causing signature-based content matching to fail without disrupting delivery.

From 1998-ptacek-insertionInsertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection · §4 · 1998

Implications

Tags

censors
generic
techniques
dpi
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.