Passive visual fingerprinting of network attack tools.
Gregory J. ContiKulsoom AbdullahPublished in: VizSEC (2004)
Keyphrases
- complex networks
- network model
- visual information
- network structure
- low level
- fault injection
- network configuration
- network architecture
- software tools
- computer networks
- network traffic
- end users
- high level
- peer to peer
- network management
- security risks
- denial of service attacks
- security measures
- network intrusion
- network administrators
- buffer overflow
- attack graphs