Detecting Grid-Abuse Attacks by Source-based Monitoring.
Jianjia WuDan ChengWei ZhaoPublished in: PDCS (2004)
Keyphrases
- network intrusion detection systems
- monitoring system
- real time
- detecting malicious
- intrusion detection
- detect malicious
- misuse detection
- countermeasures
- security threats
- denial of service attacks
- grid services
- anomaly detection
- signal processing
- network intrusion
- malicious users
- malicious activities
- decision support
- data management