๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

An overview of network evasion methods

โœ Scribed by Brian Hernacki; Jeremy Bennett; James Hoagland


Publisher
Elsevier Science
Year
2005
Tongue
English
Weight
244 KB
Volume
10
Category
Article
ISSN
1363-4127

No coin nor oath required. For personal study only.

โœฆ Synopsis


In recent years much attention has been paid in the network security space to a variety of issues including performance and detection capability. Resistance to evasion however has not been pursued with the same level of interest. During this time many of the technologies have evolved. New applications, protocols and services abound and even the security devices themselves have also become more complex. This lack of focus combined with significant change presents new risks. This paper provides an overview of evasion techniques both new and old, and considers them relative to current technologies.


๐Ÿ“œ SIMILAR VOLUMES


An overview of neural network methods in
โœ Rabindra K. Mishra ๐Ÿ“‚ Article ๐Ÿ“… 2001 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 242 KB

Some of the applications of neural network techniques in different methods, in computational electromagnetics, are highlighted. Applications in finite element method for automated mesh generation are described. Extrapolation of the FDTD data using FIR filterbased neural network is illustrated. Use o

An overview of methods for determining O
โœ Zeshui Xu ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 176 KB

The ordered weighted aggregation ~OWA! operator has received more and more attention since its appearance. One key point in the OWA operator is to determine its associated weights. In this article, I first briefly review existing main methods for determining the weights associated with the OWA opera