IDS Evasion
at the Network Level
¨Use IP fragments on IDSs that cannot perform packet reassembly ¨Send a flood of fragments to saturate IDS prior to attacking targets
¨Fragment the packets in unexpected ways