[go: up one dir, main page]

Huber, 2011 - Google Patents

Host-based systemic network obfuscation system for windows

Huber, 2011

View PDF
Document ID
2668846065214330659
Author
Huber K
Publication year

External Links

Snippet

Network traffic identifies the operating system and services of the host that created the traffic. Current obfuscation programs focus solely on the Transport and Internet layer protocols of the TCPIP model. Few obfuscation programs were developed to run on a Windows …
Continue reading at apps.dtic.mil (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Izhikevich et al. {LZR}: Identifying unexpected internet services
Ndatinya et al. Network forensics analysis using Wireshark
US9712490B1 (en) Identifying applications for intrusion detection systems
Zang et al. Botnet detection through fine flow classification
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Naik et al. Discovering hackers by stealth: Predicting fingerprinting attacks on honeypot systems
Hudaib et al. DNS advanced attacks and analysis
Jony et al. An effective method to detect dhcp starvation attack using port scanning
Mabsali et al. Effectiveness of Wireshark Tool for Detecting Attacks and Vulnerabilities in Network Traffic
Pandey et al. Attacks & defense mechanisms for TCP/IP based protocols
Griffioen et al. Could you clean up the Internet with a Pit of Tar? Investigating tarpit feasibility on Internet worms
Huber Host-based systemic network obfuscation system for windows
Hoffstadt et al. Improved detection and correlation of multi-stage VoIP attack patterns by using a Dynamic Honeynet System
Chen et al. Detecting Internet worms at early stage
Mantoo et al. A machine learning model for detection of man in the middle attack over unsecured devices
Gehrke The unexplored impact of ipv6 on intrusion detection systems
Shing An improved tarpit for network deception
Choi et al. Cookies and Sessions: A Study of what they are, how they can be Stolen and a Discussion on Security
Bhuyan et al. Practical tools for attackers and defenders
Louis Detection of session hijacking
Wang et al. A dynamic analysis security testing infrastructure for internet of things
Selvaraj Distributed Denial of Service Attack Detection, Prevention and Mitigation Service on Cloud Environment
Mitrokotsa et al. Denial-of-service attacks
Kibret et al. Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
Puvvada et al. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems