Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots.
Upendra BartwalSubhasis MukhopadhyayRohit NegiSandeep K. ShuklaPublished in: DSC (2022)
Keyphrases
- forensic analysis
- industrial automation
- information security
- access control
- security issues
- security mechanisms
- security systems
- intrusion detection
- security requirements
- network security
- computer security
- statistical databases
- database
- security protocols
- data management
- network management
- smart card
- service oriented architecture
- information flow
- learning processes
- data mining
- security threats
- security level
- authentication protocol
- security analysis
- human operators
- sensitive data
- security policies