Explanations of basic IDS evasion techniques as well as suggested fixes and countermeasures to such attacks. Topics covered include basic string-matching weaknesses, polymorphic shell code, session splicing, fragmentation attacks, and denial of servic...
A good overall collection of IDS resources including links to log analysis, honeypot, and other useful tools. Also includes information regarding the THOR and Odin IDS projects.
IDS coverage from Network World, including an in-depth review of eight IDS products, tips for deployment and false alarm reduction, terminology glossary, and related news stories.