Protocol scrubbing: network security through transparent flow modification using active real time database.
Satish Narayanrao GujarS. R. GuptaM. S. AliPublished in: ICWET (2010)
Keyphrases
- network security
- database
- real time
- end hosts
- packet filtering
- intrusion detection
- situation assessment
- traffic analysis
- intrusion detection system
- computer networks
- network traffic
- databases
- information security
- dos attacks
- security policies
- network administrators
- security breaches
- anomaly detection
- database systems
- anti phishing
- wireless sensor
- risk assessment
- ip networks
- denial of service attacks
- wired networks
- data fusion
- database applications
- security protection
- oracle database
- ad hoc networks
- database management systems
- data model