Lucene search

K
securityvulnsBUGTRAQSECURITYVULNS:VULN:5725
HistoryFeb 02, 2006 - 12:00 a.m.

Using timing attacks to bypass intrusion detection

2006-02-0200:00:00
BUGTRAQ
vulners.com
27

It's possible to use difference in timing, for example packet reasembly timeouts, of target system and IDS to bypass detection. As workaround, timing parameters of IDS should be configured to match timing parameters of protected system.