From simulation to emulation - an integrated approach for network security evaluation.
Martin MöllerRainer ByeKarsten BsufkaSeyit Ahmet ÇamtepeSahin AlbayrakPublished in: GI-Jahrestagung (2011)
Keyphrases
- network security
- intrusion detection
- computer networks
- intrusion detection system
- traffic analysis
- computer security
- security protection
- network administrators
- dos attacks
- network traffic
- packet filtering
- security breaches
- security policies
- real world
- ip networks
- risk assessment
- information security
- anomaly detection
- network intrusion
- information systems
- data fusion
- text classification
- situation assessment
- denial of service
- information technology
- end hosts
- information retrieval
- real time
- anti phishing