Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment.
Jianjian AiHongchang ChenZehua GuoGuozhen ChengThar BakerPublished in: Future Gener. Comput. Syst. (2020)
Keyphrases
- normal traffic
- network devices
- malicious users
- network traffic
- network management
- attack graphs
- ip address
- detecting malicious
- anomaly detection
- attack graph
- intrusion detection system
- buffer overflow
- ip networks
- penetration testing
- end hosts
- heterogeneous networks
- network topology
- ddos attacks
- computer networks
- internet protocol