Network Intrusion Detection systems can monitor traffic in real time on networks. Which one of the following techniques can be very effective at avoiding proper detection?
If the default fragmentation reassembly timeout is set to higher on the client than on the IDS then the it is possible to send an attack in fragments that will never be reassembled in the IDS but they will be reassembled and read on the client computer acting victim.
Veronica
4 months agoLettie
4 months agoChi
4 months agoYolando
4 months agoFelice
5 months agoAnnett
5 months agoMonte
5 months agoKara
5 months agoVenita
5 months agoCherilyn
5 months agoSophia
5 months ago