DOI: 10.1007/978-3-540-87403-4_35
|View full text |Cite
|
Sign up to set email alerts
|

Deep Packet Inspection Using Message Passing Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Technologies like deep packet inspection [10,12,22] and detection of embedded shell code [8,23] can help, but given the intimate interaction of the data with the host system, it is very difficult to predict behavior in situ reliably [15,27]. Nevertheless, our networks are architected around this "attack detection" paradigm, where we base our defenses on the fallacy that we can reliably sort good from bad at the border of our system or our site.…”
Section: Attack Detectionmentioning
confidence: 99%
“…Technologies like deep packet inspection [10,12,22] and detection of embedded shell code [8,23] can help, but given the intimate interaction of the data with the host system, it is very difficult to predict behavior in situ reliably [15,27]. Nevertheless, our networks are architected around this "attack detection" paradigm, where we base our defenses on the fallacy that we can reliably sort good from bad at the border of our system or our site.…”
Section: Attack Detectionmentioning
confidence: 99%