FINDING · DEFENSE
An 'insertion' attack sends TCP segments with forged TTL values low enough to expire at the IDS/censor but not at the true destination. The IDS incorporates the spurious segment into its reconstructed stream—seeing 'ATXTACK'—while the end-system assembles the intended byte stream 'ATTACK,' causing signature-based content matching to fail without disrupting delivery.
From 1998-ptacek-insertion — Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection · §4 · 1998
Implications
- Inject low-TTL decoy packets into a censored flow to corrupt the censor's DPI stream reconstruction while the destination silently discards them; this is a concrete first-order Geneva packet strategy.
- Any DPI censor that does not verify TTL reachability before incorporating a segment into the tracked stream is vulnerable to insertion; probe for this before deploying more expensive obfuscation.
Tags
Extracted by claude-sonnet-4-6 — review before relying.