Effective Control Flow Integrity Checks for Intrusion Detection.
Ameya ChaudhariJacob A. AbrahamPublished in: IOLTS (2018)
Keyphrases
- intrusion detection
- control flow
- intrusion detection system
- network security
- anomaly detection
- network traffic
- data flow
- network intrusion detection
- data mining
- detecting anomalous
- information security
- data sets
- network intrusion
- artificial immune
- computer security
- artificial intelligence
- alert correlation
- database
- software testing
- test set
- case study
- web services
- high detection rate
- learning algorithm
- process model
- fraud detection
- network attacks
- network intrusions