Next generation firewall for network security: a survey

K Neupane, R Haddad, L Chen - SoutheastCon 2018, 2018 - ieeexplore.ieee.org
In today's world, with the advent of internet, the network security has become a necessity to
protect the usability and integrity of network and data. Traditional firewalls are incapable of …

Detection and recognition of atomic evasions against network intrusion detection/prevention systems

J Jingping, C Kehua, C Jia, Z Dengwen, M Wei - IEEE Access, 2019 - ieeexplore.ieee.org
Network evasions can bypass network intrusion detection/prevention systems to deliver
exploits, attacks, or malware to victims without being detected. This paper presents a novel …

An SSH predictive model using machine learning with web proxy session logs

J Lee, H Lee - International Journal of Information Security, 2022 - Springer
An adversary can use SSH communication as a route for information leakage or hacking.
Many studies have focused on TCP header analysis to detect encrypted communication …

Design and research of safety test model based on advanced evasion techniques

H Xia, Y Xu - 2017 Global Conference on Mechanics and Civil …, 2017 - atlantis-press.com
With the continuous development of Internet technology, means of network attack are
constantly renovated. This paper mainly studies the technical characteristics of evading …

Saldırı tespit ve engelleme sistemlerini atlatma saldırıları

H Kılıç - 2019 - 193.140.108.196
Saldırı tespit ve engelleme sistemleri siber güvenlik mimarisinin ilk ve en önemli katmanıdır.
Bu teknolojiler sistemlerde bulunan zafiyetleri sömürmeye ve sistemlerin içerisine yasa dışı …