A Formal Approach for Complex Attacks Generation based on Mutation of 5G Network Traffic.
Zujany SalazarFatiha ZaïdiWissam MallouliAna Rosa CavalliHuu Nghia NguyenEdgardo Montes de OcaPublished in: ICSOFT (2022)
Keyphrases
- network traffic
- traffic analysis
- network traffic data
- intrusion detection
- network intrusions
- malicious traffic
- normal traffic
- anomaly detection
- intrusion detection system
- malicious code
- network security
- computer networks
- traffic data
- network intrusion
- network management
- network intrusion detection
- network bandwidth
- internet traffic
- network monitoring
- detecting anomalous
- real world
- traffic volume
- network attacks
- web caching
- network resources
- countermeasures
- machine learning
- traffic engineering