Data reduction by identification and correlation of TCP/IP attack attributes for network forensics
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Hi-index | 0.00 |
A few years have passed since malicious hackers started using packet fragmentation to create a variety of problems for a host of targets. The attackers' goals are basically to carry out information gathering operations and then generate bona fide denial-of-service attacks against the protection mechanisms.