Monitoring for security intrusion using performance signatures.
Alberto AvritzerRajanikanth TanikellaKiran JamesRobert G. ColeElaine J. WeyukerPublished in: WOSP/SIPEW (2010)
Keyphrases
- intrusion detection
- network security
- intrusion detection and prevention
- network monitoring
- intrusion detection system
- information security
- monitoring system
- wireless sensor
- security policies
- access control
- security issues
- malicious users
- denial of service attacks
- real time
- anomaly detection
- situational awareness
- computer security
- cyber security
- network traffic
- security systems
- security properties
- cyber attacks
- early warning
- security requirements
- network management
- computer networks
- dos attacks
- security threats
- key management