Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Yo KanemotoKazufumi AokiMakoto IwamuraJun MiyoshiDaisuke KotaniHiroki TakakuraYasuo OkabePublished in: COMPSAC (2) (2019)
Keyphrases
- network intrusion detection systems
- intrusion detection system
- misuse detection
- intrusion detection
- malicious activities
- network intrusion
- attack scenarios
- network security
- anomaly detection
- attack detection
- computer networks
- alert correlation
- network intrusion detection
- network attacks
- network traffic
- denial of service attacks
- cyber attacks
- computer security
- network intrusions
- normal behavior
- computer systems
- real time
- cooperative
- intrusion prevention