NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic.
Ivan HomoliakDaniel OvsonkaMatej GrégrPetr HanácekPublished in: ICITST (2014)
Keyphrases
- network traffic
- traffic analysis
- network resources
- network administrators
- traffic load
- high speed networks
- internet traffic
- traffic data
- network configuration
- computer networks
- communication networks
- transportation networks
- network traffic monitoring
- buffer overflow
- origin destination
- resource utilization
- network security
- telecommunication networks
- network management
- anomaly detection
- network conditions
- network layer
- network structure
- traffic engineering
- neural network
- intrusion detection
- traffic volume
- complex networks
- road network
- security risks
- reverse engineering
- traffic flow
- network monitoring
- congestion control
- traffic management
- cellular networks