Overwhelm
|
An attacker sends so much data that the IDS just cannot
examine all of it and some slips past unnoticed
|
Web text
|
An attackers uses URL character codes to trigger attacks
rather then using normal text
|
Timeouts
|
An attacker slows down the attack so that each part of it is
seen as unrelated to one another by the IDS
|
Extra Characters
|
The attacker simply puts extra characters into the attack in
order to change the attack signature
|
Replace Spaces
|
An attacker uses "tabs" rather than spaces in the attack so
as to change the attack signature
|
Reverse Attacks
|
An attacker basically runs the attack in reverse to confuse
the IDS
|
Multiple Sessions
|
An attacker runs each step of the attack in a separate
session
|
Multiple Sites
|
An attacker uses multiple points of origin to run the attack
|