Choose a country or area to see content specific to your location
-
PRODUCTS AND SERVICES
-
Oscilloscopes
-
Analyzers
- Spectrum Analyzers (Signal Analyzers)
- Network Analyzers
- Logic Analyzers
- Protocol Analyzers and Exercisers
- Bit Error Ratio Testers
- Noise Figure Analyzers and Noise Sources
- High-Speed Digitizers and Multichannel DAQ Solutions
- AC Power Analyzers
- DC Power Analyzers
- Materials Test Equipment
- Device Current Waveform Analyzers
- Parameter / Device Analyzers and Curve Tracers
-
Meters
-
Generators, Sources, and Power Supplies
-
Software
-
Wireless
-
Modular Instruments
-
Network Test and Security
-
Network Visibility
-
Services
-
Additional Products
- All Products, Software, Services
-
-
Solutions
-
Explore by Use Case
Explore by Industry
- All Solutions
- Insights
- Resources
- Support
What are you looking for?

Unmasking Network and Data Evasions
A well-written evasion can enable full sessions carried in packets that completely sidestep security systems. Many security devices have ways of normalizing data and detecting these types of compromises. However, they typically are not enabled when devices are initially deployed because they have a huge overhead in terms of processing time. But what if you want to enhance your intrusion prevention/detection system (IPS/IDS) or next-generation firewall (NGFW) protection by turning on the evasion detection feature? You’ll want to test and hone it in the lab first. Read this document to learn more about the top evasion techniques and how Ixia's BreakingPoint can help you make informed decisions on the trade-off between prevention and performance.
- © Keysight Technologies 2000–2023
- Privacy
- Sitemap
- Terms
- Trademark Acknowledgements
- Feedback