An Exploit Traffic Detection Method Based on Reverse Shell

As the most crucial link in the network kill chain, exploiting a vulnerability is viewed as one of the most popular attack vectors to get the control authority of the system, which is dangerous for legal users. Therefore, an effective exploit traffic detection method is urgent. However, current meth...

Full description

Bibliographic Details
Main Authors: Yajing Liu, Ruijie Cai, Xiaokang Yin, Shengli Liu
Format: Article
Language:English
Published: MDPI AG 2023-06-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/13/12/7161