Evaluating the Observability of Network Security Monitoring Strategies With TOMATO.
James HalvorsenJesse WaiteAdam HahnPublished in: IEEE Access (2019)
Keyphrases
- network security
- computer networks
- situation assessment
- intrusion detection
- network monitoring
- intrusion detection system
- traffic analysis
- wireless sensor
- network traffic
- security policies
- information security
- computer security
- monitoring system
- real time
- dos attacks
- ip networks
- risk assessment
- security breaches
- security protection
- network intrusion
- anomaly detection
- packet filtering
- anti phishing
- network administrators
- decision support
- wired networks
- online auctions
- decision making
- databases