Evasion techniques efficiency over the ips/ids technology

H Kılıç, NS Katal, AA Selçuk - 2019 4th International …, 2019 - ieeexplore.ieee.org
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of
the defense of cyber-environment. This technology is made for capturing and preventing …

A fuzzing-based method for testing rules in intrusion detection systems in 6g networks

H Chen, B Yuan, D Zou, H Jin - IEEE Network, 2022 - ieeexplore.ieee.org
With the growing development of 6G techniques, it is more challenging than ever to tune
rules in the signature-based network intrusion detection system (NIDS). Often, network …

Detection and recognition of atomic evasions against network intrusion detection/prevention systems

J Jingping, C Kehua, C Jia, Z Dengwen, M Wei - IEEE Access, 2019 - ieeexplore.ieee.org
Network evasions can bypass network intrusion detection/prevention systems to deliver
exploits, attacks, or malware to victims without being detected. This paper presents a novel …

An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems

P Dedousis, G Stergiopoulos, D Gritzalis - … 2020, Online Event, July 8–10 …, 2021 - Springer
We present an improved network attack evasion technique that allows malicious two-way
communication and bypasses popular host and network intrusion techniques/systems that …

Research on network security protection system based on dynamic modeling

F Shu, M Li, ST Chen, X Wang… - 2017 IEEE 2nd Information …, 2017 - ieeexplore.ieee.org
A dynamic modeling method for network security vulnerabilities which is composed of the
design of safety evaluation model, the design of risk model of intrusion event and the design …

CephVault: A secure Key Management System (KMS) for Ceph

S Rana - 2024 - unbscholar.lib.unb.ca
Organizations are leveraging cluster storage solutions to address expansive storage
requirements. Ceph is a reliable and massively scalable cluster solution that supports …

[图书][B] Application of Reinforcement Learning Yields More Robust Data Breach Controls for Working from Home

R Mallarapu - 2021 - search.proquest.com
In the last 5 years, the United States has lost $13.2 billion to cyberattacks. Microsoft, FireEye,
the Department of Defense, the Department of Homeland Security, and many other …

Network anomaly detection in cloud and IoT using fuzzy logic

SIA Al-Hadeethi - 2023 - openaccess.altinbas.edu.tr
The Internet of Things (IoT) is a new technology that seeks to give all physical objects a
virtual presence on the Internet. The primary idea behind IoT is to give physical objects …

[图书][B] Factors Affecting the Adoption of Application Allowlisting at United States-Based Enterprise Organizations: A Phenomenological Study

RD Painter - 2023 - search.proquest.com
Application allowlisting is a security control by which the execution of software on a system
is limited to a pre-authorized list of applications. Although the control has demonstrated …

[PDF][PDF] Systematic Approach Towards Analysis and Mitigation of Advanced Evasion Techniques

J Pannu, S Virtanen, A Hakkala - … , Dept. of Future Technologies, Univ. of …, 2019 - utupub.fi
The results from the analysis showed that 4-6% of AETs, can successfully masquerade
attacks and bypass one of the most modern and updated network security solution …