Login / Signup
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.
Zhichun Li
Lanjia Wang
Yan Chen
Zhi Fu
Published in:
ICNP (2007)
Keyphrases
</>
denial of service attacks
countermeasures
signature verification
computer viruses
network traffic
signature recognition
total length
malicious attacks
data sets
neural network
fixed length
generation method
ddos attacks
malicious users