2019
DOI: 10.1109/access.2019.2925639
|View full text |Cite
|
Sign up to set email alerts
|

Detection and Recognition of Atomic Evasions Against Network Intrusion Detection/Prevention Systems

Abstract: Network evasions can bypass network intrusion detection/prevention systems to deliver exploits, attacks, or malware to victims without being detected. This paper presents a novel method for the detection and recognition of atomic network evasions by the classification of a transmission control protocol (TCP) stream's packet behavior. The syntax for the conversion of TCP streams to codeword streams is proposed to facilitate the extraction of statistical features while preserving the evasion behavior attributes … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…The techniques for detecting intrusions are divided into three categories: misuse, anomaly, and hybrid model [6,11,18,19,23,25,29,32,38,41] . The misuse detection establishes patterns of illegal conduct, referred to as signatures, in particular to foresee and identify later attempts that would be similar.…”
Section: Related Research Workmentioning
confidence: 99%
“…The techniques for detecting intrusions are divided into three categories: misuse, anomaly, and hybrid model [6,11,18,19,23,25,29,32,38,41] . The misuse detection establishes patterns of illegal conduct, referred to as signatures, in particular to foresee and identify later attempts that would be similar.…”
Section: Related Research Workmentioning
confidence: 99%
“…2) Access control technologies, including firewall technology, Discretionary Access Control (DAC), Mandatory Access Control (MAC) [9], Role-Based Access Control (RBAC) [10], [11], Attribute-Based Access Control (ABAC) [12], etc. 3) Security monitoring technology, including intrusion detection and prevention systems [13], [14], biometrics [15], honeypot technology [16], information filtering, and more. Although technologies are emerging in an endless stream, they are generally limited by the following deficiencies.…”
Section: Introductionmentioning
confidence: 99%