A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System.
Wen-Hsu HsiaoHui-Kai SuYu-Siang WeiWei-Sheng HoKim-Joan ChenPublished in: NPC (2012)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- network traffic
- security policies
- information security
- traffic analysis
- computer security
- dos attacks
- ip networks
- network intrusion
- anomaly detection
- risk assessment
- network administrators
- packet filtering
- security protection
- machine learning
- situation assessment
- cyber security
- risk management
- learning algorithm