A study of pattern analysis for covert channel features based on Internet protocols

碩士 === 大葉大學 === 資訊管理學系碩士班 === 93 === With the growth of Internet technology utilization, hackers can take advantages of security holes of the systems and protocols to develop some complex and various intrusion skills, such as denial of service attacks (DoS), virus attacks and Trojan horse attacks. A...

Full description

Bibliographic Details
Main Authors: Tsung Chieh Lin, 林宗杰
Other Authors: Woei Jiunn Tsaur
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/95738599564844069863