to elude most network intrusion detection systems. The attacks implemented correspond to those listed in the Secure Networks ``Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January, 1998. |
||
---|---|---|
.. | ||
patch-aa | ||
patch-ab | ||
patch-ac | ||
patch-ad | ||
patch-ae | ||
patch-af |