-
2
-
-
0012054514
-
Covert channels in the TCP/IP Protocols Suite.
-
C. H. Rowland. Covert channels in the TCP/IP Protocols Suite. First Monday 2, 1997.
-
(1997)
First Monday
, vol.2
-
-
Rowl, H.C.1
-
3
-
-
79958234122
-
Covert channels and countermeasures in computer network protocols.
-
S. Zander, G. Armitage, and P. Branch. Covert channels and countermeasures in computer network protocols. IEEE Communication Magazine, 45, 136-142, 2007.
-
(2007)
IEEE Communication Magazine
, vol.45
, pp. 136-142
-
-
Zer, S.1
Armitage, G.2
Branch, P.3
-
4
-
-
51849115621
-
-
IEEE
-
E. P. Freire, A. Ziviani, and R. M. Salles. Detecting Skype flows in Web traffic, Network Operations and Management Symposium, 2008. NOMS 2008. IEEE, pp. 8996, 2008.
-
(2008)
Detecting Skype flows in Web traffic, Network Operations and Management Symposium, 2008. NOMS 2008.
, pp. 8996
-
-
Freire, E.P.1
Ziviani, A.2
Salles, M.R.3
-
7
-
-
33750711125
-
Profiling internet backbone traffic: behavior models and applications.
-
K. Xu, Z. Zhang, and S. Bhattacharyya. Profiling internet backbone traffic: behavior models and applications. SIGCOMM Computer Communication Review, 35, 169-180, 2005.
-
(2005)
SIGCOMM Computer Communication Review
, vol.35
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
8
-
-
33845735523
-
-
C. V. Wright, F. Monrose, and G. M. Masson. On Inferring Application Protocol Behaviors in Encrypted Network Traffic. Journal of Machine Learning Research, 7, 2745-2769, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2745-2769
-
-
Wright, C.V.1
Monrose, F.2
Masson, M.G.3
-
9
-
-
50949121337
-
-
IEEE.
-
A. Karasaridis, K. Meier-Hellstern; D. Hoein. Detection of DNS Anomalies using Flow Data Analysis, Global Telecommunications Conference, 2006. GLOBECOM '06, pp. 1-6. IEEE.2006.
-
(2006)
Detection of DNS Anomalies using Flow Data Analysis, Global Telecommunications Conference, 2006. GLOBECOM '06
, pp. 1-6
-
-
Karasaridis, A.1
Meier-Hellstern, K.2
Hoein, D.3
-
11
-
-
67649201166
-
-
Cairns, Australia, June
-
T. van Leijenhorst, D. Lowe and K.-W. Chin. On the Viability and Performance of DN. Tunneling The 5th International Conference on Information Technology and Applications (ICITA' 08), Cairns, Australia, June 23-26, 2008.
-
(2008)
On the Viability and Performance of DN. Tunneling The 5th International Conference on Information Technology and Applications (ICITA' 08)
, pp. 23-26
-
-
Van Leijenhorst, T.1
Lowe, D.2
Chin, K.W.3
-
13
-
-
84880704428
-
-
NSTX.(date last accessed May 2011).
-
NSTX. http://nstx.sourceforge.net/. (date last accessed May 2011).
-
-
-
-
14
-
-
84880761968
-
-
DNSCat.(date last accessed May 2011).
-
DNSCat. http://tadek.pietraszek.org/projects/DNScat/. (date last accessed May 2011).
-
-
-
-
15
-
-
84880744645
-
-
Iodine. (date last accessed May 2011).
-
Iodine. http://code.kryo.se/iodine/. (date last accessed May 2011).
-
-
-
-
16
-
-
84880746373
-
-
DNS2TCP. (date last accessed June 2011).
-
DNS2TCP. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en. (date last accessed June 2011).
-
-
-
-
17
-
-
84880715812
-
-
Ozyman. (date last accessed February 2011).
-
Ozyman. http://www.cship.info/mirror/dnstunnel/ozymandns_src_0.1.tgz (date last accessed February 2011).
-
-
-
-
18
-
-
84880750997
-
-
Iperf. (date last accessed June 2011).
-
Iperf. http://sourceforge.net/projects/iperf/(date last accessed June 2011).
-
-
-
-
19
-
-
84880757659
-
-
Hping. (date last accessed June 2011).
-
Hping. http://www.hping.org/(date last accessed June 2011).
-
-
-
-
20
-
-
84880710268
-
-
tshark. (date last accessed March 2011).
-
tshark. http://www.wireshark.org/docs/man-pages/tshark.html (date last accessed March 2011).
-
-
-
-
21
-
-
84880717528
-
-
WireShark. (date last accessed July 2011).
-
WireShark. http://www.wireshark.org (date last accessed July 2011).
-
-
-
-
22
-
-
84880724347
-
-
Heyoka. (date last accessed February 2011).
-
Heyoka. http://heyoka.sourceforge.net (date last accessed February 2011).
-
-
-
-
23
-
-
84880742646
-
-
PSUDP. (date last accessed February 2011).
-
PSUDP. http://www.kentonborn.com/psudp (date last accessed February 2011).
-
-
-
-
24
-
-
78751621903
-
Neural visualization of network traffic data for intrusion detection.
-
E. Corchado, Aá. Herrero. Neural visualization of network traffic data for intrusion detection. Applied Soft Computing, 11, 2042-2056, 2011.
-
(2011)
Applied Soft Computing
, vol.11
, pp. 2042-2056
-
-
Corchado, E.1
Herrero, Aá.2
-
25
-
-
78650135042
-
MOVIH-IDS: A mobile-visualization hybrid intrusion detection system.
-
Aá. Herrero, E. Corchado, M. A. Pellicer, A. Abraham. MOVIH-IDS: A mobile-visualization hybrid intrusion detection system. Neurocomputing, 72, 2775-2784, 2009.
-
(2009)
Neurocomputing
, vol.72
, pp. 2775-2784
-
-
Herrero, Aá.1
Corchado, E.2
Pellicer, M.A.3
Abraham, A.4
|