Intrusion Detection In Depth

This paper examines methods to identify vulnerabilities within a network by only passively listening to network traffic. Since these techniques do not write any packets to the network, they could also be used in network forensics analysis. First, a history of operating system identification...
Hee So
February 16, 2002

All papers are copyrighted. No re-posting of papers is permitted