Malicious ICMP Tunneling: Defense against the Vulnerability.
Abhishek SinghOla NordströmChenghuai LuAndré L. M. dos SantosPublished in: ACISP (2003)
Keyphrases
- computer virus
- network security
- intrusion detection
- computer viruses
- risk assessment
- malicious behavior
- malicious attacks
- advanced research projects agency
- buffer overflow
- detect malicious
- information systems
- multi agent
- ddos attacks
- insider attacks
- malicious code
- security risks
- database
- multiscale
- database systems
- website
- genetic algorithm
- neural network