Remote Identification of Port Scan Toolchains
暂无分享,去创建一个
[1] Bogdan M. Wilamowski,et al. The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.
[2] Christian Doerr,et al. Scan prediction and reconnaissance mitigation through commodity graphics cards , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[3] Vinod Yegneswaran,et al. Using Honeynets for Internet Situational Awareness , 2005 .
[4] Vern Paxson,et al. A brief history of scanning , 2007, IMC '07.
[5] Cynthia Bailey Lee,et al. Detection and Characterization of Port Scan Attacks , 2003 .
[6] Vern Paxson,et al. Detecting stealthy, distributed SSH brute-forcing , 2013, CCS.
[7] Antonio Pescapè,et al. Analysis of a "/0" stealth scan from a botnet , 2015, TNET.
[8] J. Alex Halderman,et al. An Internet-Wide View of Internet-Wide Scanning , 2014, USENIX Security Symposium.