Mining and utilization of network protocol’s stealth attack behavior

The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to imp...

ver descrição completa

Detalhes bibliográficos
Principais autores: Yan-jing HU, Qing-qi PEI
Formato: Artigo
Idioma:zho
Publicado em: Editorial Department of Journal on Communications 2017-10-01
coleção:Tongxin xuebao
Assuntos:
Acesso em linha:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017244/