暂无分享,去创建一个
Martín Ochoa | Petr Hanácek | Ivan Homoliak | Saeid Hosseini | Dominik Breitenbacher | Martin Teknos | I. Homoliak | Martín Ochoa | Dominik Breitenbacher | S. Hosseini | P. Hanáček | Martin Teknos
[1] David M. Watson,et al. Protocol scrubbing: network security through transparent flow modification , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[2] Fabio Roli,et al. Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues , 2013, Inf. Sci..
[3] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[4] Petr Hanácek,et al. Characteristics of buffer overflow attacks tunneled in HTTP traffic , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).
[5] Kymie M. C. Tan,et al. Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits , 2002, RAID.
[6] Ivan Homoliak,et al. Advanced Security Network Metrics , 2014 .
[7] Marc Dacier,et al. A revised taxonomy for intrusion-detection systems , 2000, Ann. des Télécommunications.
[8] Somesh Jha,et al. Automatic generation and analysis of NIDS attacks , 2004, 20th Annual Computer Security Applications Conference.
[9] Petr Hanácek,et al. NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).
[10] A. Singh,et al. Stateless Model For The Prevention of Malicious Communication Channels , 2006 .
[11] S. Hemminger. Network Emulation with NetEm , 2022 .
[12] Charles V. Wright,et al. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis , 2009, NDSS.
[13] Patrick P. K. Chan,et al. One-and-a-Half-Class Multiple Classifier Systems for Secure Learning Against Evasion Attacks at Test Time , 2015, MCS.
[14] Vern Paxson,et al. Active mapping: resisting NIDS evasion without altering traffic , 2003, 2003 Symposium on Security and Privacy, 2003..
[15] Blaine Nelson,et al. The security of machine learning , 2010, Machine Learning.
[16] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[17] Petr Hanácek,et al. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection , 2016, SecureComm.
[18] Wenke Lee,et al. Polymorphic Blending Attacks , 2006, USENIX Security Symposium.
[19] Thomas Henry Ptacek,et al. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .
[20] Yuan-Cheng Lai,et al. Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems , 2012, IEEE Communications Surveys & Tutorials.
[21] Kangbin Yim,et al. Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.
[22] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[23] Chih-Hung Lin,et al. A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems , 2008, DIMVA.
[24] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[25] David A. Wagner,et al. Audio Adversarial Examples: Targeted Attacks on Speech-to-Text , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[26] Sarang Dharmapurikar,et al. Robust TCP Stream Reassembly in the Presence of Adversaries , 2005, USENIX Security Symposium.
[27] Evangelos P. Markatos,et al. Tolerating Overload Attacks Against Packet Capturing Systems , 2012, USENIX Annual Technical Conference.