作者: Muhammad Qasim Ali , Ehab Al-Shaer , Taghrid Samak
DOI: 10.1109/TIFS.2013.2296874
关键词:
摘要: In the past decade, scanning has been widely used as a reconnaissance technique to gather critical network information launch follow up attack. To combat, numerous intrusion detectors have proposed. However, methodologies shifted next-generation paradigm be evasive. The techniques are intelligent and stealthy. These use low volume packet sequence calculation for victim selection more Previously, we proposed models firewall policy that set bound learning accuracy well put minimum requirements on number of probes. We presented reconstructing by intelligently choosing probing packets based responses previous this paper, show statistical analysis these discuss their evasiveness along with improvement. First, present previously two followed current detectors. Based analysis, still exhibit pattern thus can detected. then develop hybrid approach maximize benefit combining heuristics.