ABSTRACT

In Chapter 12, we described issues in remote exploit detection, and in Chapter 13, we described our data mining tool DExtor for remote exploit detection. In this chapter, we describe the datasets, experimental setup, and the results that we have obtained for DExtor.