Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.
Mark FosterJoseph N. WilsonShigang ChenPublished in: ISC (2004)
Keyphrases
- countermeasures
- greedy algorithm
- search algorithm
- detection method
- automatic detection
- detection algorithm
- normal traffic
- network attacks
- detect malicious
- shortest path
- dynamic programming
- search space
- website
- detecting malicious
- path finding
- dos attacks
- detection mechanism
- malicious attacks
- information systems
- neural network
- data sets