Evading Stepping-Stone Detection with Enough Chaff
Stepping-stones are used extensively by attackers to hide their identity and access restricted targets. Many methods have been proposed to detect stepping-stones and resist evasive behaviour, but so far no benchmark dataset exists to provide a fair compar
- PDF / 27,845,979 Bytes
- 458 Pages / 439.37 x 666.142 pts Page_size
- 36 Downloads / 165 Views