wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall / IDS Evasion Techniques

profile
44_Vikash Yadav
Sep 15, 2023
0 Likes
0 Discussions
237 Reads

Introduction

An Intrusion Detection System is a set of tools or systems that monitors and analyzes the Network Traffic for any suspicious activities and issues alerts when any such activity is observed.

Similarly, a Firewall is a network security framework, that manages the outbound and inbound network traffic by permitting or blocking the packets based on the set of security rules.

Although the Firewalls and IDS can prevent the Malicious Packets from entering a network, an Attacker can send manipulated packets to the target such that it can evade the IDS / Firewall. There are several such evasion techniques.

 

Following are the Top few Techniques to evade the Firewall or an Intrusion Detection System:

 

 Packet Fragmentation

Generally, as the name itself tells — A Packet Fragmentation is the method, where an attacker splits the probe packets into several smaller fragments, before sending them to the target network. As soon as the packets reach the target system, the IDS or Firewall enqueue them and process each of them one by one. However, being too many packets because of the fragmentation requires greater CPU and network resource consumption. Let me tell you, that most of the Intrusion Detection Systems are configured to skip the fragmented packets during the scanning.

 

Source Routing

An IP datagram contains several fields which also include the source routing information and a list of IP addresses through which the packet will travel to reach its destination. If you don’t know this already, let me tell you when the packets travel through the different nodes in the network, each router examines the destination IP Address associated with it and chooses the next hop to direct the packet to its destination.

 

Spoofing the IP Address

Spoofing the IP Address is one of the hijacking techniques, where an attacker obtains a computer’s IP Address alters the packet headers, and then sends the request packets to the target machine, pretending it to be a legitimate host. The packets also appear to be coming from a legitimate source but actually are sent from the attacker’s machine.

 

Randomizing the order of Host

The attacker scans the number of hosts in the target network in a random order to scan the intended target that is secured behind the firewall. Our favorite tool NMAP provides us an option of randomizing hosts as well.


Comments ()


Sign in

Read Next

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Blockchain Security Technique

Blog banner

Security Breaches in Stock market trading

Blog banner

Deadlock and starvation

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

GIS Mapping

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

File system implementation

Blog banner

ONLINE NEWSROOMS

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Short note on Microsoft office

Blog banner

OS Assignment 3

Blog banner

Health is Wealth

Blog banner

Deadlock and Starvation

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Traditional UNIX Scheduling

Blog banner

Blog name

Blog banner

Deadlock

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Kernel in Operating System

Blog banner

Smartsheet

Blog banner

Satellite Based Positioning

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Whatsapp Messenger

Blog banner

Google App Engine

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Service design process in ITSM

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

PERT Overview

Blog banner

Stop Racism

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Different types of scam frauds

Blog banner

AI and cyber Security

Blog banner

Deadlock

Blog banner

Emotional Suppression: The Hidden Costs Of Unfelt Feelings

Blog banner

Data Science & AI

Blog banner