Huber, 2011 - Google Patents
Host-based systemic network obfuscation system for windowsHuber, 2011
View PDF- Document ID
- 2668846065214330659
- Author
- Huber K
- Publication year
External Links
Snippet
Network traffic identifies the operating system and services of the host that created the traffic. Current obfuscation programs focus solely on the Transport and Internet layer protocols of the TCPIP model. Few obfuscation programs were developed to run on a Windows …
- 238000000034 method 0 abstract description 109
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Izhikevich et al. | {LZR}: Identifying unexpected internet services | |
Ndatinya et al. | Network forensics analysis using Wireshark | |
US9712490B1 (en) | Identifying applications for intrusion detection systems | |
Zang et al. | Botnet detection through fine flow classification | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Naik et al. | Discovering hackers by stealth: Predicting fingerprinting attacks on honeypot systems | |
Hudaib et al. | DNS advanced attacks and analysis | |
Jony et al. | An effective method to detect dhcp starvation attack using port scanning | |
Mabsali et al. | Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic | |
Pandey et al. | Attacks & defense mechanisms for TCP/IP based protocols | |
Griffioen et al. | Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms | |
Huber | Host-based systemic network obfuscation system for windows | |
Hoffstadt et al. | Improved detection and correlation of multi-stage VoIP attack patterns by using a Dynamic Honeynet System | |
Chen et al. | Detecting Internet worms at early stage | |
Mantoo et al. | A machine learning model for detection of man in the middle attack over unsecured devices | |
Gehrke | The unexplored impact of ipv6 on intrusion detection systems | |
Shing | An improved tarpit for network deception | |
Choi et al. | Cookies and Sessions: A Study of what they are, how they can be Stolen and a Discussion on Security | |
Bhuyan et al. | Practical tools for attackers and defenders | |
Louis | Detection of session hijacking | |
Wang et al. | A dynamic analysis security testing infrastructure for internet of things | |
Selvaraj | Distributed Denial of Service Attack Detection, Prevention and Mitigation Service on Cloud Environment | |
Mitrokotsa et al. | Denial-of-service attacks | |
Kibret et al. | Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis | |
Puvvada et al. | An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems |