A Formal Approach to Verify Completeness and Detect Anomalies in Firewall Security Policies.
Ahmed KhoumsiWadie KrombiMohammed ErradiPublished in: FPS (2014)
Keyphrases
- security policies
- network security
- detect anomalies
- anomaly detection
- network traffic
- intrusion detection
- intrusion detection system
- security management
- packet filtering
- unauthorized access
- access control
- computer networks
- security concerns
- security requirements
- distributed systems
- access control systems
- multilevel secure
- data mining
- unsupervised learning
- home network
- principal component analysis
- access control policies
- learning algorithm
- database