Abstract | ||
---|---|---|
Pivoting is a technique used by cyber attackers to exploit the privileges of compromised hosts in order to reach their final target. Existing research on countering this menace is only effective for pivoting activities spanning within the internal network perimeter. When applying existing methods to include external traffic, the detection algorithm produces overwhelming entries, most of which unre... |
Year | Venue | Keywords |
---|---|---|
2021 | 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM) | Protocols,Telecommunication traffic,Organizations,Machine learning,Inspection,Feature extraction,Reliability |
DocType | ISBN | Citations |
Conference | 978-3-903176-32-4 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Martin Husák | 1 | 49 | 11.42 |
Giovanni Apruzzese | 2 | 0 | 0.34 |
Shanchieh Jay Yang | 3 | 131 | 23.11 |
Gordon Werner | 4 | 9 | 2.59 |