Generative Adversarial Network for Enhancement Network Security Log Detection.
Yu ZhangYanqing SongJianguo ChenLong ChenPublished in: ICIC (8) (2024)
Keyphrases
- network security
- network attacks
- traffic analysis
- computer networks
- network administrators
- network traffic
- intrusion detection
- end hosts
- intrusion detection system
- security protection
- network intrusion
- anomaly detection
- dos attacks
- packet filtering
- situation assessment
- network management
- computer security
- network monitoring
- denial of service
- information security
- risk assessment
- security policies
- network intrusion detection
- wired networks
- normal behavior
- network access
- worm detection
- communication networks
- wireless sensor
- cyber security
- anti phishing
- databases
- internet traffic
- traffic data
- data transfer
- machine learning