Lightweight Network Intrusion Detection

碩士 === 國立中山大學 === 資訊管理學系研究所 === 93 === Exploit codes based on system vulnerabilities are often used by attackers to attack target computers or services. Such exploit programs often send attack packets in the first few packets right after a connection established with the target machine or service. A...

Full description

Bibliographic Details
Main Authors: Ya-lin Chen, 陳雅玲
Other Authors: Chia-mei Chen
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/27481173991986034005