Academic Journals Database
Disseminating quality controlled scientific knowledge

Weaknesses, Vulnerabilities And Elusion Strategies Against Intrusion Detection Systems

Author(s): Hossein Jadidoleslamy

Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252

Volume: 3;
Issue: 4;
Start page: 15;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Security | Intrusion | Intrusion Detection System (IDS) | Detection | Prevention | Computer Network & Intruder.

One of most important existent issues in information security application domain is Intrusion Detection System (IDS); IDS is a defensive-aggressive system to protect information, verifying and responding tooccurring attacks on computer systems and networks. This paper discusses different topics including presenting some strategies against IDSs to passing from them; this leads to improving detection level and performance of IDS; also, this paper considers some intrusion tools, new attacks patterns and trackingprevention techniques. In addition, it discusses vulnerabilities, security holes and IDSs' structural and systemic problems to eliminating defects, reducing penetrates and correcting their behavior. Finally, it leads to increasing the functionality coefficient of IDSs, promoting the security level of computer systems and networks, increasing the trust of authorized users. So, the proposed methods in this paper can apply to improving the IDSs by using inverse engineering methods.
RPA Switzerland

Robotic Process Automation Switzerland


Tango Rapperswil
Tango Rapperswil