Training Network Managers to Recognise Intrusion Attacks.
Colin PattinsonKemal HajdarevicPublished in: ICETE (2) (2004)
Keyphrases
- network intrusion
- intrusion detection and prevention
- denial of service attacks
- traffic analysis
- intrusion detection
- network attacks
- network security
- network intrusions
- network traffic
- network anomaly detection
- malicious users
- network model
- network intrusion detection
- anomaly detection
- intrusion prevention
- dos attacks
- computer networks
- complex networks
- recurrent networks
- network structure
- network intrusion detection systems
- radial basis function network
- attack scenarios
- security threats
- data mining
- ddos attacks
- intrusion detection system
- fault injection
- alert correlation
- buffer overflow
- communication networks
- worm detection
- peer to peer
- decision making