Detecting Advanced Attacks Based On Linux Logs.
Lin ChenAidong XuXiaoyun KuangHuahui LvHang YangYiwei YangBo LiPublished in: BigDataSecurity/HPSC/IDS (2020)
Keyphrases
- network intrusion detection systems
- operating system
- open source
- countermeasures
- detect malicious
- detecting malicious
- windows nt
- automatic detection
- log data
- malicious attacks
- malicious activities
- databases
- web intelligence
- watermarking scheme
- database applications
- security mechanisms
- security protocols
- traffic analysis
- database systems
- terrorist attacks
- linux kernel
- case study
- database