Network security: Protocol reference model and the trusted computer system evaluation criteria.
Marshall D. AbramsAlbert B. JengPublished in: IEEE Netw. (1987)
Keyphrases
- evaluation criteria
- computer systems
- reference model
- network security
- computer networks
- intrusion detection system
- end hosts
- packet filtering
- computer security
- operating system
- traffic analysis
- intrusion detection
- data processing
- information systems
- information security
- metamodel
- lightweight
- denial of service attacks
- software architecture
- security policies
- dos attacks
- network traffic
- case study
- anomaly detection
- fuzzy rules
- network management
- artificial intelligence
- pattern recognition
- expert systems
- ranking functions
- ranking algorithm