Study on Network Security Proactive Defense Model Based on Honey Pot Technology.
Haicheng ZhangPublished in: ICICA (2) (2012)
Keyphrases
- network security
- intrusion detection
- computer networks
- traffic analysis
- intrusion detection system
- network traffic
- risk assessment
- computer security
- anomaly detection
- information security
- ip networks
- decision making
- security breaches
- security protection
- data mining
- packet filtering
- digital economy
- wireless sensor
- security policies