Netinfo Security ›› 2016, Vol. 16 ›› Issue (1): 70-74.doi: 10.3969/j.issn.1671-1122.2016.01.013

• Orginal Article • Previous Articles     Next Articles

Overviews of Network Intrusion Evasion and Defense Techniques

Tingting SHI(), Youjian ZHAO   

  1. Department of Computer Science and Technology ,Tsinghua University, Beijing 100084, China
  • Received:2015-11-17 Online:2016-01-01 Published:2020-05-13

Abstract:

Popularity and wide application of the Internet makes network security much more attention, but the methods of network attack are constantly updated. The intrusion evasion technique is used to disguise the data traffic. By confusing the signature, the intrusion detection system can not recognize the attack. It has brought great threats and challenges to the network security. This paper introduces the development and principle of intrusion evasion techniques. It describes five basic evasion techniques and summarizes the main features of advanced evasion techniques. In addition, it lists some methods of evasion defense and detection. Finally, we come to the conclusions.

Key words: network security, intrusion detection system, intrusion evasion techniques, advanced evasion techniques, evasion defense techniques

CLC Number: