Construction of Compound DDOS Network Security System Based on PKI and CA Authentication.
Bin WangXiaolei ZhangPublished in: DPTA (2019)
Keyphrases
- network security
- security policies
- identity authentication
- security mechanisms
- public key infrastructure
- intrusion detection system
- intrusion detection
- computer networks
- information security
- traffic analysis
- cellular automata
- security issues
- security requirements
- digital watermarking
- network access
- dos attacks
- network traffic
- anomaly detection
- public key cryptography
- security breaches
- digital signature
- denial of service attacks
- computer security
- security protection
- ddos attacks
- risk assessment
- secure communication
- end hosts
- smart grid
- public key
- anti phishing
- situation assessment
- object recognition
- resource constrained
- network administrators
- network management