Niemi, 2014 - Google Patents
Protect Against Advanced Evasion TechniquesNiemi, 2014
View PDF- Document ID
- 15434094356512448617
- Author
- Niemi O
- Publication year
External Links
Snippet
Background “The implementation of a protocol must be robust. Each implementation must expect to interoperate with others created by different individuals. While the goal of this specification is to be explicit about the protocol, there is the possibility of differing …
- 238000000034 method 0 title description 45
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9491142B2 (en) | Malware analysis system | |
US7610375B2 (en) | Intrusion detection in a data center environment | |
Harris et al. | TCP/IP security threats and attack methods | |
US7313618B2 (en) | Network architecture using firewalls | |
Ndatinya et al. | Network forensics analysis using Wireshark | |
US20070133537A1 (en) | Leveraging active firewalls for network intrusion detection and retardation of attack | |
Chakrabarti et al. | Study of snort-based IDS | |
AU2012259113A1 (en) | Malware analysis system | |
EP2599276A1 (en) | System and method for network level protection against malicious software | |
Noonan et al. | Firewall fundamentals | |
Schneider | The state of network security | |
Dutta et al. | Intrusion detection systems fundamentals | |
Särelä et al. | Evaluating intrusion prevention systems with evasions | |
Niemi et al. | Evading deep inspection for fun and shell | |
Niemi et al. | Dismantling intrusion prevention systems | |
Niemi | Protect Against Advanced Evasion Techniques | |
Bansal et al. | Analysis and Detection of various DDoS attacks on Internet of Things Network | |
US10757078B2 (en) | Systems and methods for providing multi-level network security | |
Hernacki et al. | An overview of network evasion methods | |
Levomaki et al. | Automatic discovery of evasion vulnerabilities using targeted protocol fuzzing | |
Xiong et al. | Overview of the evasion resilience testing technology for network based intrusion protecting devices | |
Andrade et al. | Dirt Jumper: A New and Fast Evolving Botnet-for-DDoS | |
Singh et al. | Vulnerabilities of Electronics Communication: solution mechanism through script | |
Carlson et al. | Intrusion detection and prevention systems | |
Bansah et al. | Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform |