Lee
This paper clearly describes the interception and analysis of malicious network traffic through the NDIS intermediate driver. Source codes will be provided in this paper and act as an interception-driver for network malicious traffic.