Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques.
Alexander BajicGeorg T. BeckerPublished in: NordSec (2018)
Keyphrases
- network security
- dos attacks
- network intrusion
- intrusion detection
- computer networks
- traffic analysis
- denial of service
- intrusion detection system
- network attacks
- security risks
- network traffic
- anomaly detection
- information security
- security policies
- denial of service attacks
- situation assessment
- computer security
- ip networks
- cyber attacks
- network intrusion detection
- risk assessment
- security protection
- real time
- anti phishing
- end hosts
- data fusion
- decision support