A study of pattern analysis for covert channel features based on Internet protocols
碩士 === 大葉大學 === 資訊管理學系碩士班 === 93 === With the growth of Internet technology utilization, hackers can take advantages of security holes of the systems and protocols to develop some complex and various intrusion skills, such as denial of service attacks (DoS), virus attacks and Trojan horse attacks. A...
Main Authors: | Tsung Chieh Lin, 林宗杰 |
---|---|
Other Authors: | Woei Jiunn Tsaur |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/95738599564844069863 |
Similar Items
-
A Study on the Detection of the Internet Protocol Based Covert Channels
by: Mou, Shann-Ling, et al.
Published: (2003) -
Covert Channels in the MQTT-Based Internet of Things
by: Aleksandar Velinov, et al.
Published: (2019-01-01) -
COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL
by: Shipulin P.M., et al.
Published: (2018-07-01) -
HTTP-based covert channel
by: Shih-cheng Lin, et al.
Published: (2007) -
Covert channels in TCP/IP protocol stack - extended version-
by: Mileva Aleksandra, et al.
Published: (2014-06-01)