Real-Time Representation of Network Traffic Behavior for Enhanced Security.
John C. McEachenJohn ZacharyPublished in: ICITA (2) (2005)
Keyphrases
- network traffic
- intrusion detection
- network security
- real time
- network monitoring
- network management
- intrusion detection system
- anomaly detection
- traffic patterns
- computer networks
- traffic analysis
- malicious traffic
- long range dependence
- traffic data
- detecting anomalous
- network traffic data
- network intrusion detection
- network bandwidth
- internet traffic
- network resources
- information security
- traffic volume
- security policies
- access control
- data analysis
- malicious code
- smart card
- normal traffic
- real world