Monitoring Network Traffic to Detect Stepping-Stone Intrusion.
Jianhua YangByong LeeStephen S. H. HuangPublished in: AINA Workshops (2008)
Keyphrases
- network traffic
- intrusion detection
- detect anomalies
- intrusion detection system
- network monitoring
- anomaly detection
- network security
- detecting anomalous
- normal traffic
- network attacks
- computer networks
- network intrusions
- network intrusion detection
- network intrusion
- network bandwidth
- network management
- monitoring system
- traffic data
- traffic analysis
- internet traffic
- traffic volume
- network resources
- traffic engineering
- network traffic data
- information security
- malicious traffic
- data mining