Detection Method for Network Penetrating Behavior Based on Communication Fingerprint

نویسندگان

  • ZHANGGUO TANG
  • JIAN ZHANG
چکیده

In order to monitor the use of network transmission software, the network penetrating technique based on encrypted proxy is discussed. By comparing the behavior of related penetration software, the concept of communication fingerprint is introduced to expand the extension of the communication features. The fingerprints database of encrypted proxy software with specific characteristics is constructed, and a heuristic identification system for encrypted proxy software is designed and implemented. Test results indicate that the system runs efficiently and the results are accurate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Strucutural Fingerprint Restoration

Fast and accurate ridge detection in fingerprints is essential to each AFIS (Automatic Fingerprint Identification System). Smudged furrows and cut ridges in the image of a finger print are major problems in any AFIS. This paper investigates a new online ridge detection method that reduces the complexity and costs associated with the fingerprint identification procedure. The noise in fingerprint...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

Crack Detection of Timoshenko Beams Using Vibration Behavior and Neural Network

Abstract: In this research, at first, the natural frequencies of a cracked beam are obtained analytically, then, location and depth of a crack in beam is identified by neural network method. The research is applied on a beam with an open crack for three different boundary conditions. For this purpose, at first, the natural frequencies of the cracked beam are obtained analytically, to get the ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012