Real traffic logs creation for testing intrusion detection systems.
Wassim El-HajjMustafa Al-TamimiFadi A. AloulPublished in: Wirel. Commun. Mob. Comput. (2015)
Keyphrases
- intrusion detection system
- network traffic
- intrusion detection
- network security
- anomaly detection
- computer networks
- malicious activities
- normal traffic
- network traffic data
- network intrusion detection
- computer security
- traffic data
- computer systems
- denial of service attacks
- distributed intrusion detection
- intrusion prevention
- cyber attacks
- network intrusion detection systems
- traffic patterns
- normal behavior
- network intrusion
- network attacks
- information security
- network intrusions
- multistage
- data mining