MimicHunter: A General Passive Network Protocol Mimicry Detection Framework

@article{Cao2015MimicHunterAG,
  title={MimicHunter: A General Passive Network Protocol Mimicry Detection Framework},
  author={Zigang Cao and Gang Xiong and Li Guo},
  journal={2015 IEEE Trustcom/BigDataSE/ISPA},
  year={2015},
  volume={1},
  pages={271-278}
}
Network based intrusions and information theft events are becoming more and more popular today. To bypass the network security devices such as firewall, intrusion detection/prevention system (IDS/IPS) and web application firewall, attackers use evasive techniques to circumvent them, of which protocol mimicry is a very useful approach. The technique camouflages malicious communications as common protocols or generally innocent applications to avoid network security audit, which has been widely… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 22 REFERENCES

Similar Papers

Loading similar papers…