wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Firewall / IDS Evasion Techniques

profile
44_Vikash Yadav
Sep 15, 2023
0 Likes
0 Discussions
237 Reads

Introduction

An Intrusion Detection System is a set of tools or systems that monitors and analyzes the Network Traffic for any suspicious activities and issues alerts when any such activity is observed.

Similarly, a Firewall is a network security framework, that manages the outbound and inbound network traffic by permitting or blocking the packets based on the set of security rules.

Although the Firewalls and IDS can prevent the Malicious Packets from entering a network, an Attacker can send manipulated packets to the target such that it can evade the IDS / Firewall. There are several such evasion techniques.

 

Following are the Top few Techniques to evade the Firewall or an Intrusion Detection System:

 

 Packet Fragmentation

Generally, as the name itself tells — A Packet Fragmentation is the method, where an attacker splits the probe packets into several smaller fragments, before sending them to the target network. As soon as the packets reach the target system, the IDS or Firewall enqueue them and process each of them one by one. However, being too many packets because of the fragmentation requires greater CPU and network resource consumption. Let me tell you, that most of the Intrusion Detection Systems are configured to skip the fragmented packets during the scanning.

 

Source Routing

An IP datagram contains several fields which also include the source routing information and a list of IP addresses through which the packet will travel to reach its destination. If you don’t know this already, let me tell you when the packets travel through the different nodes in the network, each router examines the destination IP Address associated with it and chooses the next hop to direct the packet to its destination.

 

Spoofing the IP Address

Spoofing the IP Address is one of the hijacking techniques, where an attacker obtains a computer’s IP Address alters the packet headers, and then sends the request packets to the target machine, pretending it to be a legitimate host. The packets also appear to be coming from a legitimate source but actually are sent from the attacker’s machine.

 

Randomizing the order of Host

The attacker scans the number of hosts in the target network in a random order to scan the intended target that is secured behind the firewall. Our favorite tool NMAP provides us an option of randomizing hosts as well.


Comments ()


Sign in

Read Next

Deadlock and Starvation in an Operating System

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Deadlocks in Operating Systems

Blog banner

note taker app

Blog banner

Memory heirchy

Blog banner

Process and Threading

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

How to grow followers on Instagram business account?

Blog banner

Dancing Classes In Mumbai

Blog banner

Embedded Operating System

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Assignment-3

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Water Resources are about to exhaust...

Blog banner

What are NFT s?

Blog banner

NETSUITE

Blog banner

Multithreading in Operating System

Blog banner

semaphores in os

Blog banner

Sweet Mango Murabba

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Understanding Regression Analysis

Blog banner

Fitness

Blog banner

Objectives and functions of Operating System...

Blog banner

Introduction to GIS

Blog banner

Android Flashlight Application

Blog banner

Types of E-Commerce

Blog banner

WomenEmpowerment

Blog banner

Processes : Process description and control

Blog banner

Swiggi

Blog banner

What is a geographic information system (GIS)?

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Types of Big Data

Blog banner

Risk management in IT

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Memory Management

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

File Systems in OS.

Blog banner