Snort Rule Detection for Countering in Network Attacks.
Venkateswarlu SomuD. B. K. KameshJ. K. R. SastryS. N. M. SitaraPublished in: FICTA (1) (2016)
Keyphrases
- network attacks
- network intrusion detection
- intrusion detection
- intrusion detection system
- network security
- network intrusions
- dos attacks
- anomaly detection
- network traffic
- data mining
- information security
- object detection
- fraud detection
- lightweight
- computer networks
- information systems
- real world
- naive bayes
- computer systems
- feature selection
- machine learning