Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q16252876> ?p ?o }
Showing triples 1 to 26 of
26
with 100 triples per page.
- Q16252876 subject Q7012863.
- Q16252876 subject Q7216528.
- Q16252876 abstract "Intrusion Detection System evasion techniques are modifications made to attacks in order to prevent detection by an Intrusion Detection System (IDS). Almost all published evasion techniques modify network attacks. The 1998 paper Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection popularized IDS evasion, and discussed both evasion techniques and areas where the correct interpretation was ambiguous depending on the targeted computer system. The 'fragroute' and 'fragrouter' programs implement evasion techniques discussed in the paper. Many web vulnerability scanners, such as 'Nikto', 'whisker' and 'Sandcat', also incorporate IDS evasion techniques.Most IDSs have been modified to detect or even reverse basic evasion techniques, but IDS evasion (and countering IDS evasion) are still active fields.".
- Q16252876 wikiPageExternalLink vb201004-evasions-in-IPS-IDS.
- Q16252876 wikiPageExternalLink ptacek98insertion.html.
- Q16252876 wikiPageExternalLink fragroute.
- Q16252876 wikiPageExternalLink nikto.shtml.
- Q16252876 wikiPageExternalLink fragrouter.
- Q16252876 wikiPageExternalLink p57-0x03.
- Q16252876 wikiPageExternalLink 1232.
- Q16252876 wikiPageExternalLink stream4.
- Q16252876 wikiPageExternalLink sandcat.
- Q16252876 wikiPageExternalLink rfp.
- Q16252876 wikiPageWikiLink Q11341.
- Q16252876 wikiPageWikiLink Q1332338.
- Q16252876 wikiPageWikiLink Q2825412.
- Q16252876 wikiPageWikiLink Q673213.
- Q16252876 wikiPageWikiLink Q7012863.
- Q16252876 wikiPageWikiLink Q7216528.
- Q16252876 wikiPageWikiLink Q745881.
- Q16252876 wikiPageWikiLink Q8795.
- Q16252876 wikiPageWikiLink Q8803.
- Q16252876 wikiPageWikiLink Q8819.
- Q16252876 wikiPageWikiLink Q950981.
- Q16252876 comment "Intrusion Detection System evasion techniques are modifications made to attacks in order to prevent detection by an Intrusion Detection System (IDS). Almost all published evasion techniques modify network attacks. The 1998 paper Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection popularized IDS evasion, and discussed both evasion techniques and areas where the correct interpretation was ambiguous depending on the targeted computer system.".
- Q16252876 label "Intrusion detection system evasion techniques".