Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach.
Mohammed Abdulaziz Al NaeemAdamu I. AbubakarM. M. Hafizur RahmanPublished in: IEEE Access (2020)
Keyphrases
- network security
- traffic analysis
- ip networks
- end hosts
- intrusion detection
- computer networks
- intrusion detection system
- anomaly detection
- information security
- security policies
- security protection
- security breaches
- risk assessment
- network traffic
- situation assessment
- network administrators
- packet filtering
- network monitoring
- computer systems
- metadata
- machine learning
- databases