Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph.
M. A. JabbarGhanshyam S. BopcheBulusu Lakshmana DeekshatuluBabu M. MehtrePublished in: SSCC (2017)
Keyphrases
- cost effective
- network security
- attack graph
- attack graphs
- intrusion detection
- intrusion detection system
- alert correlation
- computer networks
- cost effectiveness
- low cost
- traffic analysis
- network traffic
- security policies
- dos attacks
- network configuration
- information security
- anomaly detection
- security management
- risk assessment
- network administrators
- security protection
- anti phishing
- computer security
- smart grid
- situation assessment
- network monitoring
- ip networks
- data mining
- neural network
- real time
- data center
- response time