Time Signatures to detect multi-headed stealthy attack tools

  • Published 2005

Abstract

In this paper, we present a method to detect the existence of sophisticated attack tools in the Internet that combine, in a misleading way, several exploits. These tools apply various attack strategies, resulting into several different attack fingerprints. A few of these sophisticated tools have already been identified, e.g. Welchia. However, devising a… (More)

Topics

9 Figures and Tables

Cite this paper

@inproceedings{2005TimeST, title={Time Signatures to detect multi-headed stealthy attack tools}, author={}, year={2005} }