An evasive attack on SNORT flowbits.
Tung TranIssam AibEhab Al-ShaerRaouf BoutabaPublished in: NOMS (2012)
Keyphrases
- intrusion detection system
- network intrusion detection
- network attacks
- attack detection
- intrusion detection
- attack scenarios
- denial of service attacks
- countermeasures
- cyber attacks
- computer networks
- security measures
- detection mechanism
- secret key
- abstract argumentation
- dos attacks
- real time
- fraud detection
- anomaly detection
- multiscale
- knowledge base
- data sets