Login / Signup

Characteristics of buffer overflow attacks tunneled in HTTP traffic.

Ivan HomoliakDaniel OvsonkaKarel KorandaPetr Hanácek
Published in: ICCST (2014)
Keyphrases
  • buffer overflow
  • data corruption
  • security problems
  • rare events
  • traffic patterns
  • network traffic
  • training data
  • privacy preserving
  • security mechanisms