[go: up one dir, main page]

Niemi, 2014 - Google Patents

Protect Against Advanced Evasion Techniques

Niemi, 2014

View PDF
Document ID
15434094356512448617
Author
Niemi O
Publication year

External Links

Snippet

Background “The implementation of a protocol must be robust. Each implementation must expect to interoperate with others created by different individuals. While the goal of this specification is to be explicit about the protocol, there is the possibility of differing …
Continue reading at ftp.tex-host.ru (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US9491142B2 (en) Malware analysis system
US7610375B2 (en) Intrusion detection in a data center environment
Harris et al. TCP/IP security threats and attack methods
US7313618B2 (en) Network architecture using firewalls
Ndatinya et al. Network forensics analysis using Wireshark
US20070133537A1 (en) Leveraging active firewalls for network intrusion detection and retardation of attack
Chakrabarti et al. Study of snort-based IDS
AU2012259113A1 (en) Malware analysis system
EP2599276A1 (en) System and method for network level protection against malicious software
Noonan et al. Firewall fundamentals
Schneider The state of network security
Dutta et al. Intrusion detection systems fundamentals
Särelä et al. Evaluating intrusion prevention systems with evasions
Niemi et al. Evading deep inspection for fun and shell
Niemi et al. Dismantling intrusion prevention systems
Niemi Protect Against Advanced Evasion Techniques
Bansal et al. Analysis and Detection of various DDoS attacks on Internet of Things Network
US10757078B2 (en) Systems and methods for providing multi-level network security
Hernacki et al. An overview of network evasion methods
Levomaki et al. Automatic discovery of evasion vulnerabilities using targeted protocol fuzzing
Xiong et al. Overview of the evasion resilience testing technology for network based intrusion protecting devices
Andrade et al. Dirt Jumper: A New and Fast Evolving Botnet-for-DDoS
Singh et al. Vulnerabilities of Electronics Communication: solution mechanism through script
Carlson et al. Intrusion detection and prevention systems
Bansah et al. Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform