Malware Defense Using Network Security Authentication.
Joseph V. AntrosioErrin W. FulpPublished in: IWIA (2005)
Keyphrases
- network security
- identity authentication
- detect malicious
- network access
- computer networks
- intrusion detection
- anti virus
- intrusion detection system
- secure communication
- traffic analysis
- information security
- anomaly detection
- dos attacks
- malware detection
- security policies
- security breaches
- computer security
- network traffic
- ip networks
- security protection
- network administrators
- risk assessment
- denial of service
- situation assessment
- databases
- end hosts
- network attacks
- ad hoc networks
- packet filtering
- anti phishing