conference logo

Playlist "SIGINT10"

Interception and Analysis of Malicious Traffic Based on NDIS Intermediate Driver

Lee

This paper clearly describes the interception and analysis of malicious network traffic through the NDIS intermediate driver. Source codes will be provided in this paper and act as an interception-driver for network malicious traffic.