Clustering perception mining of network protocol’s stealth attack behavior

Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining al...

Full description

Bibliographic Details
Published in:Tongxin xuebao
Main Authors: Yan-jing HU, Qing-qi PEI
Format: Article
Language:Chinese
Published: Editorial Department of Journal on Communications 2017-06-01
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017123/