Passive Visual Fingerprinting of Network Attack Tools
#1

Passive Visual Fingerprinting of Network Attack Tools

[attachment=16431]
RELATED WORK
The primary contributions of this work include the
demonstration of the efficacy of fingerprinting common
attack tools, the ability to provide rapid insight into the
attacker’s operating system type and the possible
lineage of the code in use, the ability to detect some
classes of stealthy attacks and the ability to detect slow
scans despite the visual noise of legitimate traffic

3. NETWORK SECURITY VISUALIZATION
PROCESS

We chose a comprehensive approach to visualize
network attacks that included consideration of all TCP,
UDP, IP and Ethernet header fields as well as many
features that can be derived from this data.


Network Layer (IP)
Network layer packets are used for host-to-host
communication across the Internet and have been
subject to much abuse by malicious entities. While we
chose to focus our visualizations on the source and
destination IP address fields there are many areas for
future work.

3.2.2 Feature Construction
Feature construction allows one to add new attributes
to the packet capture dataset constructed based upon
the captured data as well as information from the
network security domain[27]. We chose the following
candidate features as useful for visualization:
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: network hacking tools ip spoofing download, network security audit tools, free network monitoring tools, network monitoring tools in linux, application of passive optical network pon, passive optical network bandwidth, passive optical network equipment,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  BRAIN FINGERPRINTING full report project uploader 2 10,786 24-10-2014, 11:49 PM
Last Post: jaseela123d
  BRAIN FINGERPRINTING ppt seminar details 1 4,082 05-03-2013, 12:56 PM
Last Post: seminar details
  Walking Stick With Heart Attack Detection seminars report seminar addict 4 4,312 10-02-2013, 06:32 PM
Last Post: Guest
  virtual network computing seminar addict 1 1,366 12-12-2012, 02:07 PM
Last Post: seminar details
  DNA FINGERPRINTING technology seminar addict 1 2,932 19-11-2012, 01:42 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,313 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,663 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  Wireless Intelligent Network (WIN) seminar details 0 958 11-06-2012, 05:46 PM
Last Post: seminar details
  Microsoft’s Visual Studio.NET seminar details 0 843 11-06-2012, 05:26 PM
Last Post: seminar details

Forum Jump: