There are methods for attacking networks that even cutting-edge security systems cannot detect, and Advanced Evasion Techniques (AETs) are one example.
The special features of AETs are the nearly infinite ways in which they can be combined to disguise attacks. As a result, they differ markedly from already-known evasion techniques.

The first part of our article series demonstrated that evasions have long been known as a way to disguise malware. So far, they are limited to only a few techniques against which most security systems offer adequate protection.

The link for this article located at SC Magazine is no longer available.