作者: Timothy N. Newsham , Thomas H. Ptacek
DOI:
关键词: Anomaly-based intrusion detection system 、 Computer security 、 Protocol analysis 、 Intrusion detection system 、 Engineering 、 Denial-of-service attack 、 Computer network 、 Host-based intrusion detection system 、 Transmission Control Protocol 、 Evasion (network security) 、 Network security
摘要: … in packets read off the wire to correctly reconstruct what is occurring inside complex prot,ocol transactions, and next, that ID systems are inherently vulnerahlr to denial of service attacks. …