A traffic normalizer placed inline ('bump in the wire') can eliminate over 70 IP/TCP packet-level ambiguities before a NIDS inspects traffic — including fragment reassembly, TTL restoration, DF flag clearing, IP option removal, and cryptographic IP ID scrambling — leaving the classifier with an unambiguous byte stream and removing the degrees of freedom an attacker needs to evade detection.
From 2001-handley-network — Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics
· §3, Appendix A
· 2001
· USENIX Security Symposium
Implications
Censors who deploy a normalizer upstream of their DPI box will strip fragmentation and TTL-based ambiguity tricks; circumvention tools must not depend on these ambiguities surviving the censor's inspection path.
IP ID scrambling at the normalizer defeats topology-inference techniques that reveal proxy infrastructure; circumvention proxies should randomize per-connection IP IDs independently to prevent equivalent enumeration by adversaries.