Passive Visual Fingerprinting of Network Attack Tools
#1

Passive Visual Fingerprinting of Network Attack Tools

[attachment=16431]
RELATED WORK
The primary contributions of this work include the
demonstration of the efficacy of fingerprinting common
attack tools, the ability to provide rapid insight into the
attacker’s operating system type and the possible
lineage of the code in use, the ability to detect some
classes of stealthy attacks and the ability to detect slow
scans despite the visual noise of legitimate traffic

3. NETWORK SECURITY VISUALIZATION
PROCESS

We chose a comprehensive approach to visualize
network attacks that included consideration of all TCP,
UDP, IP and Ethernet header fields as well as many
features that can be derived from this data.


Network Layer (IP)
Network layer packets are used for host-to-host
communication across the Internet and have been
subject to much abuse by malicious entities. While we
chose to focus our visualizations on the source and
destination IP address fields there are many areas for
future work.

3.2.2 Feature Construction
Feature construction allows one to add new attributes
to the packet capture dataset constructed based upon
the captured data as well as information from the
network security domain[27]. We chose the following
candidate features as useful for visualization:
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: tools for network security, free network monitoring tools, application of passive optical network pon, network management tools, passive optical network com, passive optical network company, network monitoring tools,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  BRAIN FINGERPRINTING full report project uploader 2 10,800 24-10-2014, 11:49 PM
Last Post: jaseela123d
  BRAIN FINGERPRINTING ppt seminar details 1 4,095 05-03-2013, 12:56 PM
Last Post: seminar details
  Walking Stick With Heart Attack Detection seminars report seminar addict 4 4,320 10-02-2013, 06:32 PM
Last Post: Guest
  virtual network computing seminar addict 1 1,373 12-12-2012, 02:07 PM
Last Post: seminar details
  DNA FINGERPRINTING technology seminar addict 1 2,939 19-11-2012, 01:42 PM
Last Post: seminar details
  DC Network Theorems seminar details 1 1,320 12-11-2012, 04:20 PM
Last Post: seminar details
  Network Theorems seminar addict 1 1,676 12-11-2012, 04:19 PM
Last Post: seminar details
  EE-201 NETWORK ANALYSIS AND SYNTHESIS seminar paper 1 1,686 09-11-2012, 12:02 PM
Last Post: seminar details
  Wireless Intelligent Network (WIN) seminar details 0 964 11-06-2012, 05:46 PM
Last Post: seminar details
  Microsoft’s Visual Studio.NET seminar details 0 847 11-06-2012, 05:26 PM
Last Post: seminar details

Forum Jump: