Using Security Policies to Automate Placement of Network Intrusion Prevention.
Nirupama TaleleJason TeutschTrent JaegerRobert F. ErbacherPublished in: ESSoS (2013)
Keyphrases
- intrusion prevention
- security policies
- intrusion detection
- network security
- intrusion detection system
- network management
- security management
- home network
- access control
- computer networks
- cyber attacks
- network traffic
- anomaly detection
- security requirements
- security concerns
- dacs scheme
- distributed systems
- security systems
- peer to peer
- access control systems
- access control policies
- security measures
- high dimensional
- databases